• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2020 Google LLC
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     https://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 // Generated by the protocol buffer compiler.  DO NOT EDIT!
17 // source: google/cloud/dataproc/v1/clusters.proto
18 
19 package com.google.cloud.dataproc.v1;
20 
21 /**
22  *
23  *
24  * <pre>
25  * Specifies Kerberos related configuration.
26  * </pre>
27  *
28  * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
29  */
30 public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3
31     implements
32     // @@protoc_insertion_point(message_implements:google.cloud.dataproc.v1.KerberosConfig)
33     KerberosConfigOrBuilder {
34   private static final long serialVersionUID = 0L;
35   // Use KerberosConfig.newBuilder() to construct.
KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder<?> builder)36   private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) {
37     super(builder);
38   }
39 
KerberosConfig()40   private KerberosConfig() {
41     rootPrincipalPasswordUri_ = "";
42     kmsKeyUri_ = "";
43     keystoreUri_ = "";
44     truststoreUri_ = "";
45     keystorePasswordUri_ = "";
46     keyPasswordUri_ = "";
47     truststorePasswordUri_ = "";
48     crossRealmTrustRealm_ = "";
49     crossRealmTrustKdc_ = "";
50     crossRealmTrustAdminServer_ = "";
51     crossRealmTrustSharedPasswordUri_ = "";
52     kdcDbKeyUri_ = "";
53     realm_ = "";
54   }
55 
56   @java.lang.Override
57   @SuppressWarnings({"unused"})
newInstance(UnusedPrivateParameter unused)58   protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
59     return new KerberosConfig();
60   }
61 
62   @java.lang.Override
getUnknownFields()63   public final com.google.protobuf.UnknownFieldSet getUnknownFields() {
64     return this.unknownFields;
65   }
66 
getDescriptor()67   public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
68     return com.google.cloud.dataproc.v1.ClustersProto
69         .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
70   }
71 
72   @java.lang.Override
73   protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable()74       internalGetFieldAccessorTable() {
75     return com.google.cloud.dataproc.v1.ClustersProto
76         .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
77         .ensureFieldAccessorsInitialized(
78             com.google.cloud.dataproc.v1.KerberosConfig.class,
79             com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
80   }
81 
82   public static final int ENABLE_KERBEROS_FIELD_NUMBER = 1;
83   private boolean enableKerberos_ = false;
84   /**
85    *
86    *
87    * <pre>
88    * Optional. Flag to indicate whether to Kerberize the cluster (default:
89    * false). Set this field to true to enable Kerberos on a cluster.
90    * </pre>
91    *
92    * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
93    *
94    * @return The enableKerberos.
95    */
96   @java.lang.Override
getEnableKerberos()97   public boolean getEnableKerberos() {
98     return enableKerberos_;
99   }
100 
101   public static final int ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER = 2;
102 
103   @SuppressWarnings("serial")
104   private volatile java.lang.Object rootPrincipalPasswordUri_ = "";
105   /**
106    *
107    *
108    * <pre>
109    * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
110    * principal password.
111    * </pre>
112    *
113    * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code>
114    *
115    * @return The rootPrincipalPasswordUri.
116    */
117   @java.lang.Override
getRootPrincipalPasswordUri()118   public java.lang.String getRootPrincipalPasswordUri() {
119     java.lang.Object ref = rootPrincipalPasswordUri_;
120     if (ref instanceof java.lang.String) {
121       return (java.lang.String) ref;
122     } else {
123       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
124       java.lang.String s = bs.toStringUtf8();
125       rootPrincipalPasswordUri_ = s;
126       return s;
127     }
128   }
129   /**
130    *
131    *
132    * <pre>
133    * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
134    * principal password.
135    * </pre>
136    *
137    * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code>
138    *
139    * @return The bytes for rootPrincipalPasswordUri.
140    */
141   @java.lang.Override
getRootPrincipalPasswordUriBytes()142   public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
143     java.lang.Object ref = rootPrincipalPasswordUri_;
144     if (ref instanceof java.lang.String) {
145       com.google.protobuf.ByteString b =
146           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
147       rootPrincipalPasswordUri_ = b;
148       return b;
149     } else {
150       return (com.google.protobuf.ByteString) ref;
151     }
152   }
153 
154   public static final int KMS_KEY_URI_FIELD_NUMBER = 3;
155 
156   @SuppressWarnings("serial")
157   private volatile java.lang.Object kmsKeyUri_ = "";
158   /**
159    *
160    *
161    * <pre>
162    * Optional. The uri of the KMS key used to encrypt various sensitive
163    * files.
164    * </pre>
165    *
166    * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
167    *
168    * @return The kmsKeyUri.
169    */
170   @java.lang.Override
getKmsKeyUri()171   public java.lang.String getKmsKeyUri() {
172     java.lang.Object ref = kmsKeyUri_;
173     if (ref instanceof java.lang.String) {
174       return (java.lang.String) ref;
175     } else {
176       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
177       java.lang.String s = bs.toStringUtf8();
178       kmsKeyUri_ = s;
179       return s;
180     }
181   }
182   /**
183    *
184    *
185    * <pre>
186    * Optional. The uri of the KMS key used to encrypt various sensitive
187    * files.
188    * </pre>
189    *
190    * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
191    *
192    * @return The bytes for kmsKeyUri.
193    */
194   @java.lang.Override
getKmsKeyUriBytes()195   public com.google.protobuf.ByteString getKmsKeyUriBytes() {
196     java.lang.Object ref = kmsKeyUri_;
197     if (ref instanceof java.lang.String) {
198       com.google.protobuf.ByteString b =
199           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
200       kmsKeyUri_ = b;
201       return b;
202     } else {
203       return (com.google.protobuf.ByteString) ref;
204     }
205   }
206 
207   public static final int KEYSTORE_URI_FIELD_NUMBER = 4;
208 
209   @SuppressWarnings("serial")
210   private volatile java.lang.Object keystoreUri_ = "";
211   /**
212    *
213    *
214    * <pre>
215    * Optional. The Cloud Storage URI of the keystore file used for SSL
216    * encryption. If not provided, Dataproc will provide a self-signed
217    * certificate.
218    * </pre>
219    *
220    * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
221    *
222    * @return The keystoreUri.
223    */
224   @java.lang.Override
getKeystoreUri()225   public java.lang.String getKeystoreUri() {
226     java.lang.Object ref = keystoreUri_;
227     if (ref instanceof java.lang.String) {
228       return (java.lang.String) ref;
229     } else {
230       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
231       java.lang.String s = bs.toStringUtf8();
232       keystoreUri_ = s;
233       return s;
234     }
235   }
236   /**
237    *
238    *
239    * <pre>
240    * Optional. The Cloud Storage URI of the keystore file used for SSL
241    * encryption. If not provided, Dataproc will provide a self-signed
242    * certificate.
243    * </pre>
244    *
245    * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
246    *
247    * @return The bytes for keystoreUri.
248    */
249   @java.lang.Override
getKeystoreUriBytes()250   public com.google.protobuf.ByteString getKeystoreUriBytes() {
251     java.lang.Object ref = keystoreUri_;
252     if (ref instanceof java.lang.String) {
253       com.google.protobuf.ByteString b =
254           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
255       keystoreUri_ = b;
256       return b;
257     } else {
258       return (com.google.protobuf.ByteString) ref;
259     }
260   }
261 
262   public static final int TRUSTSTORE_URI_FIELD_NUMBER = 5;
263 
264   @SuppressWarnings("serial")
265   private volatile java.lang.Object truststoreUri_ = "";
266   /**
267    *
268    *
269    * <pre>
270    * Optional. The Cloud Storage URI of the truststore file used for SSL
271    * encryption. If not provided, Dataproc will provide a self-signed
272    * certificate.
273    * </pre>
274    *
275    * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
276    *
277    * @return The truststoreUri.
278    */
279   @java.lang.Override
getTruststoreUri()280   public java.lang.String getTruststoreUri() {
281     java.lang.Object ref = truststoreUri_;
282     if (ref instanceof java.lang.String) {
283       return (java.lang.String) ref;
284     } else {
285       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
286       java.lang.String s = bs.toStringUtf8();
287       truststoreUri_ = s;
288       return s;
289     }
290   }
291   /**
292    *
293    *
294    * <pre>
295    * Optional. The Cloud Storage URI of the truststore file used for SSL
296    * encryption. If not provided, Dataproc will provide a self-signed
297    * certificate.
298    * </pre>
299    *
300    * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
301    *
302    * @return The bytes for truststoreUri.
303    */
304   @java.lang.Override
getTruststoreUriBytes()305   public com.google.protobuf.ByteString getTruststoreUriBytes() {
306     java.lang.Object ref = truststoreUri_;
307     if (ref instanceof java.lang.String) {
308       com.google.protobuf.ByteString b =
309           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
310       truststoreUri_ = b;
311       return b;
312     } else {
313       return (com.google.protobuf.ByteString) ref;
314     }
315   }
316 
317   public static final int KEYSTORE_PASSWORD_URI_FIELD_NUMBER = 6;
318 
319   @SuppressWarnings("serial")
320   private volatile java.lang.Object keystorePasswordUri_ = "";
321   /**
322    *
323    *
324    * <pre>
325    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
326    * password to the user provided keystore. For the self-signed certificate,
327    * this password is generated by Dataproc.
328    * </pre>
329    *
330    * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
331    *
332    * @return The keystorePasswordUri.
333    */
334   @java.lang.Override
getKeystorePasswordUri()335   public java.lang.String getKeystorePasswordUri() {
336     java.lang.Object ref = keystorePasswordUri_;
337     if (ref instanceof java.lang.String) {
338       return (java.lang.String) ref;
339     } else {
340       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
341       java.lang.String s = bs.toStringUtf8();
342       keystorePasswordUri_ = s;
343       return s;
344     }
345   }
346   /**
347    *
348    *
349    * <pre>
350    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
351    * password to the user provided keystore. For the self-signed certificate,
352    * this password is generated by Dataproc.
353    * </pre>
354    *
355    * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
356    *
357    * @return The bytes for keystorePasswordUri.
358    */
359   @java.lang.Override
getKeystorePasswordUriBytes()360   public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
361     java.lang.Object ref = keystorePasswordUri_;
362     if (ref instanceof java.lang.String) {
363       com.google.protobuf.ByteString b =
364           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
365       keystorePasswordUri_ = b;
366       return b;
367     } else {
368       return (com.google.protobuf.ByteString) ref;
369     }
370   }
371 
372   public static final int KEY_PASSWORD_URI_FIELD_NUMBER = 7;
373 
374   @SuppressWarnings("serial")
375   private volatile java.lang.Object keyPasswordUri_ = "";
376   /**
377    *
378    *
379    * <pre>
380    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
381    * password to the user provided key. For the self-signed certificate, this
382    * password is generated by Dataproc.
383    * </pre>
384    *
385    * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
386    *
387    * @return The keyPasswordUri.
388    */
389   @java.lang.Override
getKeyPasswordUri()390   public java.lang.String getKeyPasswordUri() {
391     java.lang.Object ref = keyPasswordUri_;
392     if (ref instanceof java.lang.String) {
393       return (java.lang.String) ref;
394     } else {
395       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
396       java.lang.String s = bs.toStringUtf8();
397       keyPasswordUri_ = s;
398       return s;
399     }
400   }
401   /**
402    *
403    *
404    * <pre>
405    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
406    * password to the user provided key. For the self-signed certificate, this
407    * password is generated by Dataproc.
408    * </pre>
409    *
410    * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
411    *
412    * @return The bytes for keyPasswordUri.
413    */
414   @java.lang.Override
getKeyPasswordUriBytes()415   public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
416     java.lang.Object ref = keyPasswordUri_;
417     if (ref instanceof java.lang.String) {
418       com.google.protobuf.ByteString b =
419           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
420       keyPasswordUri_ = b;
421       return b;
422     } else {
423       return (com.google.protobuf.ByteString) ref;
424     }
425   }
426 
427   public static final int TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER = 8;
428 
429   @SuppressWarnings("serial")
430   private volatile java.lang.Object truststorePasswordUri_ = "";
431   /**
432    *
433    *
434    * <pre>
435    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
436    * password to the user provided truststore. For the self-signed certificate,
437    * this password is generated by Dataproc.
438    * </pre>
439    *
440    * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
441    *
442    * @return The truststorePasswordUri.
443    */
444   @java.lang.Override
getTruststorePasswordUri()445   public java.lang.String getTruststorePasswordUri() {
446     java.lang.Object ref = truststorePasswordUri_;
447     if (ref instanceof java.lang.String) {
448       return (java.lang.String) ref;
449     } else {
450       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
451       java.lang.String s = bs.toStringUtf8();
452       truststorePasswordUri_ = s;
453       return s;
454     }
455   }
456   /**
457    *
458    *
459    * <pre>
460    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
461    * password to the user provided truststore. For the self-signed certificate,
462    * this password is generated by Dataproc.
463    * </pre>
464    *
465    * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
466    *
467    * @return The bytes for truststorePasswordUri.
468    */
469   @java.lang.Override
getTruststorePasswordUriBytes()470   public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
471     java.lang.Object ref = truststorePasswordUri_;
472     if (ref instanceof java.lang.String) {
473       com.google.protobuf.ByteString b =
474           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
475       truststorePasswordUri_ = b;
476       return b;
477     } else {
478       return (com.google.protobuf.ByteString) ref;
479     }
480   }
481 
482   public static final int CROSS_REALM_TRUST_REALM_FIELD_NUMBER = 9;
483 
484   @SuppressWarnings("serial")
485   private volatile java.lang.Object crossRealmTrustRealm_ = "";
486   /**
487    *
488    *
489    * <pre>
490    * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
491    * the user enable cross realm trust.
492    * </pre>
493    *
494    * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
495    *
496    * @return The crossRealmTrustRealm.
497    */
498   @java.lang.Override
getCrossRealmTrustRealm()499   public java.lang.String getCrossRealmTrustRealm() {
500     java.lang.Object ref = crossRealmTrustRealm_;
501     if (ref instanceof java.lang.String) {
502       return (java.lang.String) ref;
503     } else {
504       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
505       java.lang.String s = bs.toStringUtf8();
506       crossRealmTrustRealm_ = s;
507       return s;
508     }
509   }
510   /**
511    *
512    *
513    * <pre>
514    * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
515    * the user enable cross realm trust.
516    * </pre>
517    *
518    * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
519    *
520    * @return The bytes for crossRealmTrustRealm.
521    */
522   @java.lang.Override
getCrossRealmTrustRealmBytes()523   public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
524     java.lang.Object ref = crossRealmTrustRealm_;
525     if (ref instanceof java.lang.String) {
526       com.google.protobuf.ByteString b =
527           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
528       crossRealmTrustRealm_ = b;
529       return b;
530     } else {
531       return (com.google.protobuf.ByteString) ref;
532     }
533   }
534 
535   public static final int CROSS_REALM_TRUST_KDC_FIELD_NUMBER = 10;
536 
537   @SuppressWarnings("serial")
538   private volatile java.lang.Object crossRealmTrustKdc_ = "";
539   /**
540    *
541    *
542    * <pre>
543    * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
544    * realm trust relationship.
545    * </pre>
546    *
547    * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
548    *
549    * @return The crossRealmTrustKdc.
550    */
551   @java.lang.Override
getCrossRealmTrustKdc()552   public java.lang.String getCrossRealmTrustKdc() {
553     java.lang.Object ref = crossRealmTrustKdc_;
554     if (ref instanceof java.lang.String) {
555       return (java.lang.String) ref;
556     } else {
557       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
558       java.lang.String s = bs.toStringUtf8();
559       crossRealmTrustKdc_ = s;
560       return s;
561     }
562   }
563   /**
564    *
565    *
566    * <pre>
567    * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
568    * realm trust relationship.
569    * </pre>
570    *
571    * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
572    *
573    * @return The bytes for crossRealmTrustKdc.
574    */
575   @java.lang.Override
getCrossRealmTrustKdcBytes()576   public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
577     java.lang.Object ref = crossRealmTrustKdc_;
578     if (ref instanceof java.lang.String) {
579       com.google.protobuf.ByteString b =
580           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
581       crossRealmTrustKdc_ = b;
582       return b;
583     } else {
584       return (com.google.protobuf.ByteString) ref;
585     }
586   }
587 
588   public static final int CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER = 11;
589 
590   @SuppressWarnings("serial")
591   private volatile java.lang.Object crossRealmTrustAdminServer_ = "";
592   /**
593    *
594    *
595    * <pre>
596    * Optional. The admin server (IP or hostname) for the remote trusted realm in
597    * a cross realm trust relationship.
598    * </pre>
599    *
600    * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
601    * </code>
602    *
603    * @return The crossRealmTrustAdminServer.
604    */
605   @java.lang.Override
getCrossRealmTrustAdminServer()606   public java.lang.String getCrossRealmTrustAdminServer() {
607     java.lang.Object ref = crossRealmTrustAdminServer_;
608     if (ref instanceof java.lang.String) {
609       return (java.lang.String) ref;
610     } else {
611       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
612       java.lang.String s = bs.toStringUtf8();
613       crossRealmTrustAdminServer_ = s;
614       return s;
615     }
616   }
617   /**
618    *
619    *
620    * <pre>
621    * Optional. The admin server (IP or hostname) for the remote trusted realm in
622    * a cross realm trust relationship.
623    * </pre>
624    *
625    * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
626    * </code>
627    *
628    * @return The bytes for crossRealmTrustAdminServer.
629    */
630   @java.lang.Override
getCrossRealmTrustAdminServerBytes()631   public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
632     java.lang.Object ref = crossRealmTrustAdminServer_;
633     if (ref instanceof java.lang.String) {
634       com.google.protobuf.ByteString b =
635           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
636       crossRealmTrustAdminServer_ = b;
637       return b;
638     } else {
639       return (com.google.protobuf.ByteString) ref;
640     }
641   }
642 
643   public static final int CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER = 12;
644 
645   @SuppressWarnings("serial")
646   private volatile java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
647   /**
648    *
649    *
650    * <pre>
651    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
652    * shared password between the on-cluster Kerberos realm and the remote
653    * trusted realm, in a cross realm trust relationship.
654    * </pre>
655    *
656    * <code>
657    * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
658    * </code>
659    *
660    * @return The crossRealmTrustSharedPasswordUri.
661    */
662   @java.lang.Override
getCrossRealmTrustSharedPasswordUri()663   public java.lang.String getCrossRealmTrustSharedPasswordUri() {
664     java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
665     if (ref instanceof java.lang.String) {
666       return (java.lang.String) ref;
667     } else {
668       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
669       java.lang.String s = bs.toStringUtf8();
670       crossRealmTrustSharedPasswordUri_ = s;
671       return s;
672     }
673   }
674   /**
675    *
676    *
677    * <pre>
678    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
679    * shared password between the on-cluster Kerberos realm and the remote
680    * trusted realm, in a cross realm trust relationship.
681    * </pre>
682    *
683    * <code>
684    * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
685    * </code>
686    *
687    * @return The bytes for crossRealmTrustSharedPasswordUri.
688    */
689   @java.lang.Override
getCrossRealmTrustSharedPasswordUriBytes()690   public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
691     java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
692     if (ref instanceof java.lang.String) {
693       com.google.protobuf.ByteString b =
694           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
695       crossRealmTrustSharedPasswordUri_ = b;
696       return b;
697     } else {
698       return (com.google.protobuf.ByteString) ref;
699     }
700   }
701 
702   public static final int KDC_DB_KEY_URI_FIELD_NUMBER = 13;
703 
704   @SuppressWarnings("serial")
705   private volatile java.lang.Object kdcDbKeyUri_ = "";
706   /**
707    *
708    *
709    * <pre>
710    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
711    * master key of the KDC database.
712    * </pre>
713    *
714    * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
715    *
716    * @return The kdcDbKeyUri.
717    */
718   @java.lang.Override
getKdcDbKeyUri()719   public java.lang.String getKdcDbKeyUri() {
720     java.lang.Object ref = kdcDbKeyUri_;
721     if (ref instanceof java.lang.String) {
722       return (java.lang.String) ref;
723     } else {
724       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
725       java.lang.String s = bs.toStringUtf8();
726       kdcDbKeyUri_ = s;
727       return s;
728     }
729   }
730   /**
731    *
732    *
733    * <pre>
734    * Optional. The Cloud Storage URI of a KMS encrypted file containing the
735    * master key of the KDC database.
736    * </pre>
737    *
738    * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
739    *
740    * @return The bytes for kdcDbKeyUri.
741    */
742   @java.lang.Override
getKdcDbKeyUriBytes()743   public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
744     java.lang.Object ref = kdcDbKeyUri_;
745     if (ref instanceof java.lang.String) {
746       com.google.protobuf.ByteString b =
747           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
748       kdcDbKeyUri_ = b;
749       return b;
750     } else {
751       return (com.google.protobuf.ByteString) ref;
752     }
753   }
754 
755   public static final int TGT_LIFETIME_HOURS_FIELD_NUMBER = 14;
756   private int tgtLifetimeHours_ = 0;
757   /**
758    *
759    *
760    * <pre>
761    * Optional. The lifetime of the ticket granting ticket, in hours.
762    * If not specified, or user specifies 0, then default value 10
763    * will be used.
764    * </pre>
765    *
766    * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
767    *
768    * @return The tgtLifetimeHours.
769    */
770   @java.lang.Override
getTgtLifetimeHours()771   public int getTgtLifetimeHours() {
772     return tgtLifetimeHours_;
773   }
774 
775   public static final int REALM_FIELD_NUMBER = 15;
776 
777   @SuppressWarnings("serial")
778   private volatile java.lang.Object realm_ = "";
779   /**
780    *
781    *
782    * <pre>
783    * Optional. The name of the on-cluster Kerberos realm.
784    * If not specified, the uppercased domain of hostnames will be the realm.
785    * </pre>
786    *
787    * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
788    *
789    * @return The realm.
790    */
791   @java.lang.Override
getRealm()792   public java.lang.String getRealm() {
793     java.lang.Object ref = realm_;
794     if (ref instanceof java.lang.String) {
795       return (java.lang.String) ref;
796     } else {
797       com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
798       java.lang.String s = bs.toStringUtf8();
799       realm_ = s;
800       return s;
801     }
802   }
803   /**
804    *
805    *
806    * <pre>
807    * Optional. The name of the on-cluster Kerberos realm.
808    * If not specified, the uppercased domain of hostnames will be the realm.
809    * </pre>
810    *
811    * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
812    *
813    * @return The bytes for realm.
814    */
815   @java.lang.Override
getRealmBytes()816   public com.google.protobuf.ByteString getRealmBytes() {
817     java.lang.Object ref = realm_;
818     if (ref instanceof java.lang.String) {
819       com.google.protobuf.ByteString b =
820           com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
821       realm_ = b;
822       return b;
823     } else {
824       return (com.google.protobuf.ByteString) ref;
825     }
826   }
827 
828   private byte memoizedIsInitialized = -1;
829 
830   @java.lang.Override
isInitialized()831   public final boolean isInitialized() {
832     byte isInitialized = memoizedIsInitialized;
833     if (isInitialized == 1) return true;
834     if (isInitialized == 0) return false;
835 
836     memoizedIsInitialized = 1;
837     return true;
838   }
839 
840   @java.lang.Override
writeTo(com.google.protobuf.CodedOutputStream output)841   public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
842     if (enableKerberos_ != false) {
843       output.writeBool(1, enableKerberos_);
844     }
845     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
846       com.google.protobuf.GeneratedMessageV3.writeString(output, 2, rootPrincipalPasswordUri_);
847     }
848     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
849       com.google.protobuf.GeneratedMessageV3.writeString(output, 3, kmsKeyUri_);
850     }
851     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
852       com.google.protobuf.GeneratedMessageV3.writeString(output, 4, keystoreUri_);
853     }
854     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
855       com.google.protobuf.GeneratedMessageV3.writeString(output, 5, truststoreUri_);
856     }
857     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
858       com.google.protobuf.GeneratedMessageV3.writeString(output, 6, keystorePasswordUri_);
859     }
860     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
861       com.google.protobuf.GeneratedMessageV3.writeString(output, 7, keyPasswordUri_);
862     }
863     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
864       com.google.protobuf.GeneratedMessageV3.writeString(output, 8, truststorePasswordUri_);
865     }
866     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
867       com.google.protobuf.GeneratedMessageV3.writeString(output, 9, crossRealmTrustRealm_);
868     }
869     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
870       com.google.protobuf.GeneratedMessageV3.writeString(output, 10, crossRealmTrustKdc_);
871     }
872     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
873       com.google.protobuf.GeneratedMessageV3.writeString(output, 11, crossRealmTrustAdminServer_);
874     }
875     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
876       com.google.protobuf.GeneratedMessageV3.writeString(
877           output, 12, crossRealmTrustSharedPasswordUri_);
878     }
879     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
880       com.google.protobuf.GeneratedMessageV3.writeString(output, 13, kdcDbKeyUri_);
881     }
882     if (tgtLifetimeHours_ != 0) {
883       output.writeInt32(14, tgtLifetimeHours_);
884     }
885     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
886       com.google.protobuf.GeneratedMessageV3.writeString(output, 15, realm_);
887     }
888     getUnknownFields().writeTo(output);
889   }
890 
891   @java.lang.Override
getSerializedSize()892   public int getSerializedSize() {
893     int size = memoizedSize;
894     if (size != -1) return size;
895 
896     size = 0;
897     if (enableKerberos_ != false) {
898       size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, enableKerberos_);
899     }
900     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
901       size +=
902           com.google.protobuf.GeneratedMessageV3.computeStringSize(2, rootPrincipalPasswordUri_);
903     }
904     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
905       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, kmsKeyUri_);
906     }
907     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
908       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, keystoreUri_);
909     }
910     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
911       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, truststoreUri_);
912     }
913     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
914       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, keystorePasswordUri_);
915     }
916     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
917       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, keyPasswordUri_);
918     }
919     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
920       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(8, truststorePasswordUri_);
921     }
922     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
923       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(9, crossRealmTrustRealm_);
924     }
925     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
926       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(10, crossRealmTrustKdc_);
927     }
928     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
929       size +=
930           com.google.protobuf.GeneratedMessageV3.computeStringSize(11, crossRealmTrustAdminServer_);
931     }
932     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
933       size +=
934           com.google.protobuf.GeneratedMessageV3.computeStringSize(
935               12, crossRealmTrustSharedPasswordUri_);
936     }
937     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
938       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(13, kdcDbKeyUri_);
939     }
940     if (tgtLifetimeHours_ != 0) {
941       size += com.google.protobuf.CodedOutputStream.computeInt32Size(14, tgtLifetimeHours_);
942     }
943     if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
944       size += com.google.protobuf.GeneratedMessageV3.computeStringSize(15, realm_);
945     }
946     size += getUnknownFields().getSerializedSize();
947     memoizedSize = size;
948     return size;
949   }
950 
951   @java.lang.Override
equals(final java.lang.Object obj)952   public boolean equals(final java.lang.Object obj) {
953     if (obj == this) {
954       return true;
955     }
956     if (!(obj instanceof com.google.cloud.dataproc.v1.KerberosConfig)) {
957       return super.equals(obj);
958     }
959     com.google.cloud.dataproc.v1.KerberosConfig other =
960         (com.google.cloud.dataproc.v1.KerberosConfig) obj;
961 
962     if (getEnableKerberos() != other.getEnableKerberos()) return false;
963     if (!getRootPrincipalPasswordUri().equals(other.getRootPrincipalPasswordUri())) return false;
964     if (!getKmsKeyUri().equals(other.getKmsKeyUri())) return false;
965     if (!getKeystoreUri().equals(other.getKeystoreUri())) return false;
966     if (!getTruststoreUri().equals(other.getTruststoreUri())) return false;
967     if (!getKeystorePasswordUri().equals(other.getKeystorePasswordUri())) return false;
968     if (!getKeyPasswordUri().equals(other.getKeyPasswordUri())) return false;
969     if (!getTruststorePasswordUri().equals(other.getTruststorePasswordUri())) return false;
970     if (!getCrossRealmTrustRealm().equals(other.getCrossRealmTrustRealm())) return false;
971     if (!getCrossRealmTrustKdc().equals(other.getCrossRealmTrustKdc())) return false;
972     if (!getCrossRealmTrustAdminServer().equals(other.getCrossRealmTrustAdminServer()))
973       return false;
974     if (!getCrossRealmTrustSharedPasswordUri().equals(other.getCrossRealmTrustSharedPasswordUri()))
975       return false;
976     if (!getKdcDbKeyUri().equals(other.getKdcDbKeyUri())) return false;
977     if (getTgtLifetimeHours() != other.getTgtLifetimeHours()) return false;
978     if (!getRealm().equals(other.getRealm())) return false;
979     if (!getUnknownFields().equals(other.getUnknownFields())) return false;
980     return true;
981   }
982 
983   @java.lang.Override
hashCode()984   public int hashCode() {
985     if (memoizedHashCode != 0) {
986       return memoizedHashCode;
987     }
988     int hash = 41;
989     hash = (19 * hash) + getDescriptor().hashCode();
990     hash = (37 * hash) + ENABLE_KERBEROS_FIELD_NUMBER;
991     hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEnableKerberos());
992     hash = (37 * hash) + ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER;
993     hash = (53 * hash) + getRootPrincipalPasswordUri().hashCode();
994     hash = (37 * hash) + KMS_KEY_URI_FIELD_NUMBER;
995     hash = (53 * hash) + getKmsKeyUri().hashCode();
996     hash = (37 * hash) + KEYSTORE_URI_FIELD_NUMBER;
997     hash = (53 * hash) + getKeystoreUri().hashCode();
998     hash = (37 * hash) + TRUSTSTORE_URI_FIELD_NUMBER;
999     hash = (53 * hash) + getTruststoreUri().hashCode();
1000     hash = (37 * hash) + KEYSTORE_PASSWORD_URI_FIELD_NUMBER;
1001     hash = (53 * hash) + getKeystorePasswordUri().hashCode();
1002     hash = (37 * hash) + KEY_PASSWORD_URI_FIELD_NUMBER;
1003     hash = (53 * hash) + getKeyPasswordUri().hashCode();
1004     hash = (37 * hash) + TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER;
1005     hash = (53 * hash) + getTruststorePasswordUri().hashCode();
1006     hash = (37 * hash) + CROSS_REALM_TRUST_REALM_FIELD_NUMBER;
1007     hash = (53 * hash) + getCrossRealmTrustRealm().hashCode();
1008     hash = (37 * hash) + CROSS_REALM_TRUST_KDC_FIELD_NUMBER;
1009     hash = (53 * hash) + getCrossRealmTrustKdc().hashCode();
1010     hash = (37 * hash) + CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER;
1011     hash = (53 * hash) + getCrossRealmTrustAdminServer().hashCode();
1012     hash = (37 * hash) + CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER;
1013     hash = (53 * hash) + getCrossRealmTrustSharedPasswordUri().hashCode();
1014     hash = (37 * hash) + KDC_DB_KEY_URI_FIELD_NUMBER;
1015     hash = (53 * hash) + getKdcDbKeyUri().hashCode();
1016     hash = (37 * hash) + TGT_LIFETIME_HOURS_FIELD_NUMBER;
1017     hash = (53 * hash) + getTgtLifetimeHours();
1018     hash = (37 * hash) + REALM_FIELD_NUMBER;
1019     hash = (53 * hash) + getRealm().hashCode();
1020     hash = (29 * hash) + getUnknownFields().hashCode();
1021     memoizedHashCode = hash;
1022     return hash;
1023   }
1024 
parseFrom(java.nio.ByteBuffer data)1025   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.nio.ByteBuffer data)
1026       throws com.google.protobuf.InvalidProtocolBufferException {
1027     return PARSER.parseFrom(data);
1028   }
1029 
parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1030   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1031       java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1032       throws com.google.protobuf.InvalidProtocolBufferException {
1033     return PARSER.parseFrom(data, extensionRegistry);
1034   }
1035 
parseFrom( com.google.protobuf.ByteString data)1036   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1037       com.google.protobuf.ByteString data)
1038       throws com.google.protobuf.InvalidProtocolBufferException {
1039     return PARSER.parseFrom(data);
1040   }
1041 
parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1042   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1043       com.google.protobuf.ByteString data,
1044       com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1045       throws com.google.protobuf.InvalidProtocolBufferException {
1046     return PARSER.parseFrom(data, extensionRegistry);
1047   }
1048 
parseFrom(byte[] data)1049   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(byte[] data)
1050       throws com.google.protobuf.InvalidProtocolBufferException {
1051     return PARSER.parseFrom(data);
1052   }
1053 
parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1054   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1055       byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1056       throws com.google.protobuf.InvalidProtocolBufferException {
1057     return PARSER.parseFrom(data, extensionRegistry);
1058   }
1059 
parseFrom(java.io.InputStream input)1060   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.io.InputStream input)
1061       throws java.io.IOException {
1062     return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
1063   }
1064 
parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1065   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1066       java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1067       throws java.io.IOException {
1068     return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
1069         PARSER, input, extensionRegistry);
1070   }
1071 
parseDelimitedFrom( java.io.InputStream input)1072   public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
1073       java.io.InputStream input) throws java.io.IOException {
1074     return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
1075   }
1076 
parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1077   public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
1078       java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1079       throws java.io.IOException {
1080     return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
1081         PARSER, input, extensionRegistry);
1082   }
1083 
parseFrom( com.google.protobuf.CodedInputStream input)1084   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1085       com.google.protobuf.CodedInputStream input) throws java.io.IOException {
1086     return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
1087   }
1088 
parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1089   public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
1090       com.google.protobuf.CodedInputStream input,
1091       com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1092       throws java.io.IOException {
1093     return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
1094         PARSER, input, extensionRegistry);
1095   }
1096 
1097   @java.lang.Override
newBuilderForType()1098   public Builder newBuilderForType() {
1099     return newBuilder();
1100   }
1101 
newBuilder()1102   public static Builder newBuilder() {
1103     return DEFAULT_INSTANCE.toBuilder();
1104   }
1105 
newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype)1106   public static Builder newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype) {
1107     return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
1108   }
1109 
1110   @java.lang.Override
toBuilder()1111   public Builder toBuilder() {
1112     return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
1113   }
1114 
1115   @java.lang.Override
newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)1116   protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
1117     Builder builder = new Builder(parent);
1118     return builder;
1119   }
1120   /**
1121    *
1122    *
1123    * <pre>
1124    * Specifies Kerberos related configuration.
1125    * </pre>
1126    *
1127    * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
1128    */
1129   public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder<Builder>
1130       implements
1131       // @@protoc_insertion_point(builder_implements:google.cloud.dataproc.v1.KerberosConfig)
1132       com.google.cloud.dataproc.v1.KerberosConfigOrBuilder {
getDescriptor()1133     public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
1134       return com.google.cloud.dataproc.v1.ClustersProto
1135           .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
1136     }
1137 
1138     @java.lang.Override
1139     protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable()1140         internalGetFieldAccessorTable() {
1141       return com.google.cloud.dataproc.v1.ClustersProto
1142           .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
1143           .ensureFieldAccessorsInitialized(
1144               com.google.cloud.dataproc.v1.KerberosConfig.class,
1145               com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
1146     }
1147 
1148     // Construct using com.google.cloud.dataproc.v1.KerberosConfig.newBuilder()
Builder()1149     private Builder() {}
1150 
Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)1151     private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
1152       super(parent);
1153     }
1154 
1155     @java.lang.Override
clear()1156     public Builder clear() {
1157       super.clear();
1158       bitField0_ = 0;
1159       enableKerberos_ = false;
1160       rootPrincipalPasswordUri_ = "";
1161       kmsKeyUri_ = "";
1162       keystoreUri_ = "";
1163       truststoreUri_ = "";
1164       keystorePasswordUri_ = "";
1165       keyPasswordUri_ = "";
1166       truststorePasswordUri_ = "";
1167       crossRealmTrustRealm_ = "";
1168       crossRealmTrustKdc_ = "";
1169       crossRealmTrustAdminServer_ = "";
1170       crossRealmTrustSharedPasswordUri_ = "";
1171       kdcDbKeyUri_ = "";
1172       tgtLifetimeHours_ = 0;
1173       realm_ = "";
1174       return this;
1175     }
1176 
1177     @java.lang.Override
getDescriptorForType()1178     public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() {
1179       return com.google.cloud.dataproc.v1.ClustersProto
1180           .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
1181     }
1182 
1183     @java.lang.Override
getDefaultInstanceForType()1184     public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
1185       return com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance();
1186     }
1187 
1188     @java.lang.Override
build()1189     public com.google.cloud.dataproc.v1.KerberosConfig build() {
1190       com.google.cloud.dataproc.v1.KerberosConfig result = buildPartial();
1191       if (!result.isInitialized()) {
1192         throw newUninitializedMessageException(result);
1193       }
1194       return result;
1195     }
1196 
1197     @java.lang.Override
buildPartial()1198     public com.google.cloud.dataproc.v1.KerberosConfig buildPartial() {
1199       com.google.cloud.dataproc.v1.KerberosConfig result =
1200           new com.google.cloud.dataproc.v1.KerberosConfig(this);
1201       if (bitField0_ != 0) {
1202         buildPartial0(result);
1203       }
1204       onBuilt();
1205       return result;
1206     }
1207 
buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result)1208     private void buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result) {
1209       int from_bitField0_ = bitField0_;
1210       if (((from_bitField0_ & 0x00000001) != 0)) {
1211         result.enableKerberos_ = enableKerberos_;
1212       }
1213       if (((from_bitField0_ & 0x00000002) != 0)) {
1214         result.rootPrincipalPasswordUri_ = rootPrincipalPasswordUri_;
1215       }
1216       if (((from_bitField0_ & 0x00000004) != 0)) {
1217         result.kmsKeyUri_ = kmsKeyUri_;
1218       }
1219       if (((from_bitField0_ & 0x00000008) != 0)) {
1220         result.keystoreUri_ = keystoreUri_;
1221       }
1222       if (((from_bitField0_ & 0x00000010) != 0)) {
1223         result.truststoreUri_ = truststoreUri_;
1224       }
1225       if (((from_bitField0_ & 0x00000020) != 0)) {
1226         result.keystorePasswordUri_ = keystorePasswordUri_;
1227       }
1228       if (((from_bitField0_ & 0x00000040) != 0)) {
1229         result.keyPasswordUri_ = keyPasswordUri_;
1230       }
1231       if (((from_bitField0_ & 0x00000080) != 0)) {
1232         result.truststorePasswordUri_ = truststorePasswordUri_;
1233       }
1234       if (((from_bitField0_ & 0x00000100) != 0)) {
1235         result.crossRealmTrustRealm_ = crossRealmTrustRealm_;
1236       }
1237       if (((from_bitField0_ & 0x00000200) != 0)) {
1238         result.crossRealmTrustKdc_ = crossRealmTrustKdc_;
1239       }
1240       if (((from_bitField0_ & 0x00000400) != 0)) {
1241         result.crossRealmTrustAdminServer_ = crossRealmTrustAdminServer_;
1242       }
1243       if (((from_bitField0_ & 0x00000800) != 0)) {
1244         result.crossRealmTrustSharedPasswordUri_ = crossRealmTrustSharedPasswordUri_;
1245       }
1246       if (((from_bitField0_ & 0x00001000) != 0)) {
1247         result.kdcDbKeyUri_ = kdcDbKeyUri_;
1248       }
1249       if (((from_bitField0_ & 0x00002000) != 0)) {
1250         result.tgtLifetimeHours_ = tgtLifetimeHours_;
1251       }
1252       if (((from_bitField0_ & 0x00004000) != 0)) {
1253         result.realm_ = realm_;
1254       }
1255     }
1256 
1257     @java.lang.Override
clone()1258     public Builder clone() {
1259       return super.clone();
1260     }
1261 
1262     @java.lang.Override
setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value)1263     public Builder setField(
1264         com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
1265       return super.setField(field, value);
1266     }
1267 
1268     @java.lang.Override
clearField(com.google.protobuf.Descriptors.FieldDescriptor field)1269     public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) {
1270       return super.clearField(field);
1271     }
1272 
1273     @java.lang.Override
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)1274     public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) {
1275       return super.clearOneof(oneof);
1276     }
1277 
1278     @java.lang.Override
setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value)1279     public Builder setRepeatedField(
1280         com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) {
1281       return super.setRepeatedField(field, index, value);
1282     }
1283 
1284     @java.lang.Override
addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value)1285     public Builder addRepeatedField(
1286         com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
1287       return super.addRepeatedField(field, value);
1288     }
1289 
1290     @java.lang.Override
mergeFrom(com.google.protobuf.Message other)1291     public Builder mergeFrom(com.google.protobuf.Message other) {
1292       if (other instanceof com.google.cloud.dataproc.v1.KerberosConfig) {
1293         return mergeFrom((com.google.cloud.dataproc.v1.KerberosConfig) other);
1294       } else {
1295         super.mergeFrom(other);
1296         return this;
1297       }
1298     }
1299 
mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other)1300     public Builder mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other) {
1301       if (other == com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance()) return this;
1302       if (other.getEnableKerberos() != false) {
1303         setEnableKerberos(other.getEnableKerberos());
1304       }
1305       if (!other.getRootPrincipalPasswordUri().isEmpty()) {
1306         rootPrincipalPasswordUri_ = other.rootPrincipalPasswordUri_;
1307         bitField0_ |= 0x00000002;
1308         onChanged();
1309       }
1310       if (!other.getKmsKeyUri().isEmpty()) {
1311         kmsKeyUri_ = other.kmsKeyUri_;
1312         bitField0_ |= 0x00000004;
1313         onChanged();
1314       }
1315       if (!other.getKeystoreUri().isEmpty()) {
1316         keystoreUri_ = other.keystoreUri_;
1317         bitField0_ |= 0x00000008;
1318         onChanged();
1319       }
1320       if (!other.getTruststoreUri().isEmpty()) {
1321         truststoreUri_ = other.truststoreUri_;
1322         bitField0_ |= 0x00000010;
1323         onChanged();
1324       }
1325       if (!other.getKeystorePasswordUri().isEmpty()) {
1326         keystorePasswordUri_ = other.keystorePasswordUri_;
1327         bitField0_ |= 0x00000020;
1328         onChanged();
1329       }
1330       if (!other.getKeyPasswordUri().isEmpty()) {
1331         keyPasswordUri_ = other.keyPasswordUri_;
1332         bitField0_ |= 0x00000040;
1333         onChanged();
1334       }
1335       if (!other.getTruststorePasswordUri().isEmpty()) {
1336         truststorePasswordUri_ = other.truststorePasswordUri_;
1337         bitField0_ |= 0x00000080;
1338         onChanged();
1339       }
1340       if (!other.getCrossRealmTrustRealm().isEmpty()) {
1341         crossRealmTrustRealm_ = other.crossRealmTrustRealm_;
1342         bitField0_ |= 0x00000100;
1343         onChanged();
1344       }
1345       if (!other.getCrossRealmTrustKdc().isEmpty()) {
1346         crossRealmTrustKdc_ = other.crossRealmTrustKdc_;
1347         bitField0_ |= 0x00000200;
1348         onChanged();
1349       }
1350       if (!other.getCrossRealmTrustAdminServer().isEmpty()) {
1351         crossRealmTrustAdminServer_ = other.crossRealmTrustAdminServer_;
1352         bitField0_ |= 0x00000400;
1353         onChanged();
1354       }
1355       if (!other.getCrossRealmTrustSharedPasswordUri().isEmpty()) {
1356         crossRealmTrustSharedPasswordUri_ = other.crossRealmTrustSharedPasswordUri_;
1357         bitField0_ |= 0x00000800;
1358         onChanged();
1359       }
1360       if (!other.getKdcDbKeyUri().isEmpty()) {
1361         kdcDbKeyUri_ = other.kdcDbKeyUri_;
1362         bitField0_ |= 0x00001000;
1363         onChanged();
1364       }
1365       if (other.getTgtLifetimeHours() != 0) {
1366         setTgtLifetimeHours(other.getTgtLifetimeHours());
1367       }
1368       if (!other.getRealm().isEmpty()) {
1369         realm_ = other.realm_;
1370         bitField0_ |= 0x00004000;
1371         onChanged();
1372       }
1373       this.mergeUnknownFields(other.getUnknownFields());
1374       onChanged();
1375       return this;
1376     }
1377 
1378     @java.lang.Override
isInitialized()1379     public final boolean isInitialized() {
1380       return true;
1381     }
1382 
1383     @java.lang.Override
mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1384     public Builder mergeFrom(
1385         com.google.protobuf.CodedInputStream input,
1386         com.google.protobuf.ExtensionRegistryLite extensionRegistry)
1387         throws java.io.IOException {
1388       if (extensionRegistry == null) {
1389         throw new java.lang.NullPointerException();
1390       }
1391       try {
1392         boolean done = false;
1393         while (!done) {
1394           int tag = input.readTag();
1395           switch (tag) {
1396             case 0:
1397               done = true;
1398               break;
1399             case 8:
1400               {
1401                 enableKerberos_ = input.readBool();
1402                 bitField0_ |= 0x00000001;
1403                 break;
1404               } // case 8
1405             case 18:
1406               {
1407                 rootPrincipalPasswordUri_ = input.readStringRequireUtf8();
1408                 bitField0_ |= 0x00000002;
1409                 break;
1410               } // case 18
1411             case 26:
1412               {
1413                 kmsKeyUri_ = input.readStringRequireUtf8();
1414                 bitField0_ |= 0x00000004;
1415                 break;
1416               } // case 26
1417             case 34:
1418               {
1419                 keystoreUri_ = input.readStringRequireUtf8();
1420                 bitField0_ |= 0x00000008;
1421                 break;
1422               } // case 34
1423             case 42:
1424               {
1425                 truststoreUri_ = input.readStringRequireUtf8();
1426                 bitField0_ |= 0x00000010;
1427                 break;
1428               } // case 42
1429             case 50:
1430               {
1431                 keystorePasswordUri_ = input.readStringRequireUtf8();
1432                 bitField0_ |= 0x00000020;
1433                 break;
1434               } // case 50
1435             case 58:
1436               {
1437                 keyPasswordUri_ = input.readStringRequireUtf8();
1438                 bitField0_ |= 0x00000040;
1439                 break;
1440               } // case 58
1441             case 66:
1442               {
1443                 truststorePasswordUri_ = input.readStringRequireUtf8();
1444                 bitField0_ |= 0x00000080;
1445                 break;
1446               } // case 66
1447             case 74:
1448               {
1449                 crossRealmTrustRealm_ = input.readStringRequireUtf8();
1450                 bitField0_ |= 0x00000100;
1451                 break;
1452               } // case 74
1453             case 82:
1454               {
1455                 crossRealmTrustKdc_ = input.readStringRequireUtf8();
1456                 bitField0_ |= 0x00000200;
1457                 break;
1458               } // case 82
1459             case 90:
1460               {
1461                 crossRealmTrustAdminServer_ = input.readStringRequireUtf8();
1462                 bitField0_ |= 0x00000400;
1463                 break;
1464               } // case 90
1465             case 98:
1466               {
1467                 crossRealmTrustSharedPasswordUri_ = input.readStringRequireUtf8();
1468                 bitField0_ |= 0x00000800;
1469                 break;
1470               } // case 98
1471             case 106:
1472               {
1473                 kdcDbKeyUri_ = input.readStringRequireUtf8();
1474                 bitField0_ |= 0x00001000;
1475                 break;
1476               } // case 106
1477             case 112:
1478               {
1479                 tgtLifetimeHours_ = input.readInt32();
1480                 bitField0_ |= 0x00002000;
1481                 break;
1482               } // case 112
1483             case 122:
1484               {
1485                 realm_ = input.readStringRequireUtf8();
1486                 bitField0_ |= 0x00004000;
1487                 break;
1488               } // case 122
1489             default:
1490               {
1491                 if (!super.parseUnknownField(input, extensionRegistry, tag)) {
1492                   done = true; // was an endgroup tag
1493                 }
1494                 break;
1495               } // default:
1496           } // switch (tag)
1497         } // while (!done)
1498       } catch (com.google.protobuf.InvalidProtocolBufferException e) {
1499         throw e.unwrapIOException();
1500       } finally {
1501         onChanged();
1502       } // finally
1503       return this;
1504     }
1505 
1506     private int bitField0_;
1507 
1508     private boolean enableKerberos_;
1509     /**
1510      *
1511      *
1512      * <pre>
1513      * Optional. Flag to indicate whether to Kerberize the cluster (default:
1514      * false). Set this field to true to enable Kerberos on a cluster.
1515      * </pre>
1516      *
1517      * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
1518      *
1519      * @return The enableKerberos.
1520      */
1521     @java.lang.Override
getEnableKerberos()1522     public boolean getEnableKerberos() {
1523       return enableKerberos_;
1524     }
1525     /**
1526      *
1527      *
1528      * <pre>
1529      * Optional. Flag to indicate whether to Kerberize the cluster (default:
1530      * false). Set this field to true to enable Kerberos on a cluster.
1531      * </pre>
1532      *
1533      * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
1534      *
1535      * @param value The enableKerberos to set.
1536      * @return This builder for chaining.
1537      */
setEnableKerberos(boolean value)1538     public Builder setEnableKerberos(boolean value) {
1539 
1540       enableKerberos_ = value;
1541       bitField0_ |= 0x00000001;
1542       onChanged();
1543       return this;
1544     }
1545     /**
1546      *
1547      *
1548      * <pre>
1549      * Optional. Flag to indicate whether to Kerberize the cluster (default:
1550      * false). Set this field to true to enable Kerberos on a cluster.
1551      * </pre>
1552      *
1553      * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
1554      *
1555      * @return This builder for chaining.
1556      */
clearEnableKerberos()1557     public Builder clearEnableKerberos() {
1558       bitField0_ = (bitField0_ & ~0x00000001);
1559       enableKerberos_ = false;
1560       onChanged();
1561       return this;
1562     }
1563 
1564     private java.lang.Object rootPrincipalPasswordUri_ = "";
1565     /**
1566      *
1567      *
1568      * <pre>
1569      * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
1570      * principal password.
1571      * </pre>
1572      *
1573      * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
1574      * </code>
1575      *
1576      * @return The rootPrincipalPasswordUri.
1577      */
getRootPrincipalPasswordUri()1578     public java.lang.String getRootPrincipalPasswordUri() {
1579       java.lang.Object ref = rootPrincipalPasswordUri_;
1580       if (!(ref instanceof java.lang.String)) {
1581         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
1582         java.lang.String s = bs.toStringUtf8();
1583         rootPrincipalPasswordUri_ = s;
1584         return s;
1585       } else {
1586         return (java.lang.String) ref;
1587       }
1588     }
1589     /**
1590      *
1591      *
1592      * <pre>
1593      * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
1594      * principal password.
1595      * </pre>
1596      *
1597      * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
1598      * </code>
1599      *
1600      * @return The bytes for rootPrincipalPasswordUri.
1601      */
getRootPrincipalPasswordUriBytes()1602     public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
1603       java.lang.Object ref = rootPrincipalPasswordUri_;
1604       if (ref instanceof String) {
1605         com.google.protobuf.ByteString b =
1606             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
1607         rootPrincipalPasswordUri_ = b;
1608         return b;
1609       } else {
1610         return (com.google.protobuf.ByteString) ref;
1611       }
1612     }
1613     /**
1614      *
1615      *
1616      * <pre>
1617      * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
1618      * principal password.
1619      * </pre>
1620      *
1621      * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
1622      * </code>
1623      *
1624      * @param value The rootPrincipalPasswordUri to set.
1625      * @return This builder for chaining.
1626      */
setRootPrincipalPasswordUri(java.lang.String value)1627     public Builder setRootPrincipalPasswordUri(java.lang.String value) {
1628       if (value == null) {
1629         throw new NullPointerException();
1630       }
1631       rootPrincipalPasswordUri_ = value;
1632       bitField0_ |= 0x00000002;
1633       onChanged();
1634       return this;
1635     }
1636     /**
1637      *
1638      *
1639      * <pre>
1640      * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
1641      * principal password.
1642      * </pre>
1643      *
1644      * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
1645      * </code>
1646      *
1647      * @return This builder for chaining.
1648      */
clearRootPrincipalPasswordUri()1649     public Builder clearRootPrincipalPasswordUri() {
1650       rootPrincipalPasswordUri_ = getDefaultInstance().getRootPrincipalPasswordUri();
1651       bitField0_ = (bitField0_ & ~0x00000002);
1652       onChanged();
1653       return this;
1654     }
1655     /**
1656      *
1657      *
1658      * <pre>
1659      * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
1660      * principal password.
1661      * </pre>
1662      *
1663      * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
1664      * </code>
1665      *
1666      * @param value The bytes for rootPrincipalPasswordUri to set.
1667      * @return This builder for chaining.
1668      */
setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value)1669     public Builder setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value) {
1670       if (value == null) {
1671         throw new NullPointerException();
1672       }
1673       checkByteStringIsUtf8(value);
1674       rootPrincipalPasswordUri_ = value;
1675       bitField0_ |= 0x00000002;
1676       onChanged();
1677       return this;
1678     }
1679 
1680     private java.lang.Object kmsKeyUri_ = "";
1681     /**
1682      *
1683      *
1684      * <pre>
1685      * Optional. The uri of the KMS key used to encrypt various sensitive
1686      * files.
1687      * </pre>
1688      *
1689      * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
1690      *
1691      * @return The kmsKeyUri.
1692      */
getKmsKeyUri()1693     public java.lang.String getKmsKeyUri() {
1694       java.lang.Object ref = kmsKeyUri_;
1695       if (!(ref instanceof java.lang.String)) {
1696         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
1697         java.lang.String s = bs.toStringUtf8();
1698         kmsKeyUri_ = s;
1699         return s;
1700       } else {
1701         return (java.lang.String) ref;
1702       }
1703     }
1704     /**
1705      *
1706      *
1707      * <pre>
1708      * Optional. The uri of the KMS key used to encrypt various sensitive
1709      * files.
1710      * </pre>
1711      *
1712      * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
1713      *
1714      * @return The bytes for kmsKeyUri.
1715      */
getKmsKeyUriBytes()1716     public com.google.protobuf.ByteString getKmsKeyUriBytes() {
1717       java.lang.Object ref = kmsKeyUri_;
1718       if (ref instanceof String) {
1719         com.google.protobuf.ByteString b =
1720             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
1721         kmsKeyUri_ = b;
1722         return b;
1723       } else {
1724         return (com.google.protobuf.ByteString) ref;
1725       }
1726     }
1727     /**
1728      *
1729      *
1730      * <pre>
1731      * Optional. The uri of the KMS key used to encrypt various sensitive
1732      * files.
1733      * </pre>
1734      *
1735      * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
1736      *
1737      * @param value The kmsKeyUri to set.
1738      * @return This builder for chaining.
1739      */
setKmsKeyUri(java.lang.String value)1740     public Builder setKmsKeyUri(java.lang.String value) {
1741       if (value == null) {
1742         throw new NullPointerException();
1743       }
1744       kmsKeyUri_ = value;
1745       bitField0_ |= 0x00000004;
1746       onChanged();
1747       return this;
1748     }
1749     /**
1750      *
1751      *
1752      * <pre>
1753      * Optional. The uri of the KMS key used to encrypt various sensitive
1754      * files.
1755      * </pre>
1756      *
1757      * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
1758      *
1759      * @return This builder for chaining.
1760      */
clearKmsKeyUri()1761     public Builder clearKmsKeyUri() {
1762       kmsKeyUri_ = getDefaultInstance().getKmsKeyUri();
1763       bitField0_ = (bitField0_ & ~0x00000004);
1764       onChanged();
1765       return this;
1766     }
1767     /**
1768      *
1769      *
1770      * <pre>
1771      * Optional. The uri of the KMS key used to encrypt various sensitive
1772      * files.
1773      * </pre>
1774      *
1775      * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
1776      *
1777      * @param value The bytes for kmsKeyUri to set.
1778      * @return This builder for chaining.
1779      */
setKmsKeyUriBytes(com.google.protobuf.ByteString value)1780     public Builder setKmsKeyUriBytes(com.google.protobuf.ByteString value) {
1781       if (value == null) {
1782         throw new NullPointerException();
1783       }
1784       checkByteStringIsUtf8(value);
1785       kmsKeyUri_ = value;
1786       bitField0_ |= 0x00000004;
1787       onChanged();
1788       return this;
1789     }
1790 
1791     private java.lang.Object keystoreUri_ = "";
1792     /**
1793      *
1794      *
1795      * <pre>
1796      * Optional. The Cloud Storage URI of the keystore file used for SSL
1797      * encryption. If not provided, Dataproc will provide a self-signed
1798      * certificate.
1799      * </pre>
1800      *
1801      * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
1802      *
1803      * @return The keystoreUri.
1804      */
getKeystoreUri()1805     public java.lang.String getKeystoreUri() {
1806       java.lang.Object ref = keystoreUri_;
1807       if (!(ref instanceof java.lang.String)) {
1808         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
1809         java.lang.String s = bs.toStringUtf8();
1810         keystoreUri_ = s;
1811         return s;
1812       } else {
1813         return (java.lang.String) ref;
1814       }
1815     }
1816     /**
1817      *
1818      *
1819      * <pre>
1820      * Optional. The Cloud Storage URI of the keystore file used for SSL
1821      * encryption. If not provided, Dataproc will provide a self-signed
1822      * certificate.
1823      * </pre>
1824      *
1825      * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
1826      *
1827      * @return The bytes for keystoreUri.
1828      */
getKeystoreUriBytes()1829     public com.google.protobuf.ByteString getKeystoreUriBytes() {
1830       java.lang.Object ref = keystoreUri_;
1831       if (ref instanceof String) {
1832         com.google.protobuf.ByteString b =
1833             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
1834         keystoreUri_ = b;
1835         return b;
1836       } else {
1837         return (com.google.protobuf.ByteString) ref;
1838       }
1839     }
1840     /**
1841      *
1842      *
1843      * <pre>
1844      * Optional. The Cloud Storage URI of the keystore file used for SSL
1845      * encryption. If not provided, Dataproc will provide a self-signed
1846      * certificate.
1847      * </pre>
1848      *
1849      * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
1850      *
1851      * @param value The keystoreUri to set.
1852      * @return This builder for chaining.
1853      */
setKeystoreUri(java.lang.String value)1854     public Builder setKeystoreUri(java.lang.String value) {
1855       if (value == null) {
1856         throw new NullPointerException();
1857       }
1858       keystoreUri_ = value;
1859       bitField0_ |= 0x00000008;
1860       onChanged();
1861       return this;
1862     }
1863     /**
1864      *
1865      *
1866      * <pre>
1867      * Optional. The Cloud Storage URI of the keystore file used for SSL
1868      * encryption. If not provided, Dataproc will provide a self-signed
1869      * certificate.
1870      * </pre>
1871      *
1872      * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
1873      *
1874      * @return This builder for chaining.
1875      */
clearKeystoreUri()1876     public Builder clearKeystoreUri() {
1877       keystoreUri_ = getDefaultInstance().getKeystoreUri();
1878       bitField0_ = (bitField0_ & ~0x00000008);
1879       onChanged();
1880       return this;
1881     }
1882     /**
1883      *
1884      *
1885      * <pre>
1886      * Optional. The Cloud Storage URI of the keystore file used for SSL
1887      * encryption. If not provided, Dataproc will provide a self-signed
1888      * certificate.
1889      * </pre>
1890      *
1891      * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
1892      *
1893      * @param value The bytes for keystoreUri to set.
1894      * @return This builder for chaining.
1895      */
setKeystoreUriBytes(com.google.protobuf.ByteString value)1896     public Builder setKeystoreUriBytes(com.google.protobuf.ByteString value) {
1897       if (value == null) {
1898         throw new NullPointerException();
1899       }
1900       checkByteStringIsUtf8(value);
1901       keystoreUri_ = value;
1902       bitField0_ |= 0x00000008;
1903       onChanged();
1904       return this;
1905     }
1906 
1907     private java.lang.Object truststoreUri_ = "";
1908     /**
1909      *
1910      *
1911      * <pre>
1912      * Optional. The Cloud Storage URI of the truststore file used for SSL
1913      * encryption. If not provided, Dataproc will provide a self-signed
1914      * certificate.
1915      * </pre>
1916      *
1917      * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
1918      *
1919      * @return The truststoreUri.
1920      */
getTruststoreUri()1921     public java.lang.String getTruststoreUri() {
1922       java.lang.Object ref = truststoreUri_;
1923       if (!(ref instanceof java.lang.String)) {
1924         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
1925         java.lang.String s = bs.toStringUtf8();
1926         truststoreUri_ = s;
1927         return s;
1928       } else {
1929         return (java.lang.String) ref;
1930       }
1931     }
1932     /**
1933      *
1934      *
1935      * <pre>
1936      * Optional. The Cloud Storage URI of the truststore file used for SSL
1937      * encryption. If not provided, Dataproc will provide a self-signed
1938      * certificate.
1939      * </pre>
1940      *
1941      * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
1942      *
1943      * @return The bytes for truststoreUri.
1944      */
getTruststoreUriBytes()1945     public com.google.protobuf.ByteString getTruststoreUriBytes() {
1946       java.lang.Object ref = truststoreUri_;
1947       if (ref instanceof String) {
1948         com.google.protobuf.ByteString b =
1949             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
1950         truststoreUri_ = b;
1951         return b;
1952       } else {
1953         return (com.google.protobuf.ByteString) ref;
1954       }
1955     }
1956     /**
1957      *
1958      *
1959      * <pre>
1960      * Optional. The Cloud Storage URI of the truststore file used for SSL
1961      * encryption. If not provided, Dataproc will provide a self-signed
1962      * certificate.
1963      * </pre>
1964      *
1965      * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
1966      *
1967      * @param value The truststoreUri to set.
1968      * @return This builder for chaining.
1969      */
setTruststoreUri(java.lang.String value)1970     public Builder setTruststoreUri(java.lang.String value) {
1971       if (value == null) {
1972         throw new NullPointerException();
1973       }
1974       truststoreUri_ = value;
1975       bitField0_ |= 0x00000010;
1976       onChanged();
1977       return this;
1978     }
1979     /**
1980      *
1981      *
1982      * <pre>
1983      * Optional. The Cloud Storage URI of the truststore file used for SSL
1984      * encryption. If not provided, Dataproc will provide a self-signed
1985      * certificate.
1986      * </pre>
1987      *
1988      * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
1989      *
1990      * @return This builder for chaining.
1991      */
clearTruststoreUri()1992     public Builder clearTruststoreUri() {
1993       truststoreUri_ = getDefaultInstance().getTruststoreUri();
1994       bitField0_ = (bitField0_ & ~0x00000010);
1995       onChanged();
1996       return this;
1997     }
1998     /**
1999      *
2000      *
2001      * <pre>
2002      * Optional. The Cloud Storage URI of the truststore file used for SSL
2003      * encryption. If not provided, Dataproc will provide a self-signed
2004      * certificate.
2005      * </pre>
2006      *
2007      * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
2008      *
2009      * @param value The bytes for truststoreUri to set.
2010      * @return This builder for chaining.
2011      */
setTruststoreUriBytes(com.google.protobuf.ByteString value)2012     public Builder setTruststoreUriBytes(com.google.protobuf.ByteString value) {
2013       if (value == null) {
2014         throw new NullPointerException();
2015       }
2016       checkByteStringIsUtf8(value);
2017       truststoreUri_ = value;
2018       bitField0_ |= 0x00000010;
2019       onChanged();
2020       return this;
2021     }
2022 
2023     private java.lang.Object keystorePasswordUri_ = "";
2024     /**
2025      *
2026      *
2027      * <pre>
2028      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2029      * password to the user provided keystore. For the self-signed certificate,
2030      * this password is generated by Dataproc.
2031      * </pre>
2032      *
2033      * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
2034      *
2035      * @return The keystorePasswordUri.
2036      */
getKeystorePasswordUri()2037     public java.lang.String getKeystorePasswordUri() {
2038       java.lang.Object ref = keystorePasswordUri_;
2039       if (!(ref instanceof java.lang.String)) {
2040         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2041         java.lang.String s = bs.toStringUtf8();
2042         keystorePasswordUri_ = s;
2043         return s;
2044       } else {
2045         return (java.lang.String) ref;
2046       }
2047     }
2048     /**
2049      *
2050      *
2051      * <pre>
2052      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2053      * password to the user provided keystore. For the self-signed certificate,
2054      * this password is generated by Dataproc.
2055      * </pre>
2056      *
2057      * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
2058      *
2059      * @return The bytes for keystorePasswordUri.
2060      */
getKeystorePasswordUriBytes()2061     public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
2062       java.lang.Object ref = keystorePasswordUri_;
2063       if (ref instanceof String) {
2064         com.google.protobuf.ByteString b =
2065             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2066         keystorePasswordUri_ = b;
2067         return b;
2068       } else {
2069         return (com.google.protobuf.ByteString) ref;
2070       }
2071     }
2072     /**
2073      *
2074      *
2075      * <pre>
2076      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2077      * password to the user provided keystore. For the self-signed certificate,
2078      * this password is generated by Dataproc.
2079      * </pre>
2080      *
2081      * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
2082      *
2083      * @param value The keystorePasswordUri to set.
2084      * @return This builder for chaining.
2085      */
setKeystorePasswordUri(java.lang.String value)2086     public Builder setKeystorePasswordUri(java.lang.String value) {
2087       if (value == null) {
2088         throw new NullPointerException();
2089       }
2090       keystorePasswordUri_ = value;
2091       bitField0_ |= 0x00000020;
2092       onChanged();
2093       return this;
2094     }
2095     /**
2096      *
2097      *
2098      * <pre>
2099      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2100      * password to the user provided keystore. For the self-signed certificate,
2101      * this password is generated by Dataproc.
2102      * </pre>
2103      *
2104      * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
2105      *
2106      * @return This builder for chaining.
2107      */
clearKeystorePasswordUri()2108     public Builder clearKeystorePasswordUri() {
2109       keystorePasswordUri_ = getDefaultInstance().getKeystorePasswordUri();
2110       bitField0_ = (bitField0_ & ~0x00000020);
2111       onChanged();
2112       return this;
2113     }
2114     /**
2115      *
2116      *
2117      * <pre>
2118      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2119      * password to the user provided keystore. For the self-signed certificate,
2120      * this password is generated by Dataproc.
2121      * </pre>
2122      *
2123      * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
2124      *
2125      * @param value The bytes for keystorePasswordUri to set.
2126      * @return This builder for chaining.
2127      */
setKeystorePasswordUriBytes(com.google.protobuf.ByteString value)2128     public Builder setKeystorePasswordUriBytes(com.google.protobuf.ByteString value) {
2129       if (value == null) {
2130         throw new NullPointerException();
2131       }
2132       checkByteStringIsUtf8(value);
2133       keystorePasswordUri_ = value;
2134       bitField0_ |= 0x00000020;
2135       onChanged();
2136       return this;
2137     }
2138 
2139     private java.lang.Object keyPasswordUri_ = "";
2140     /**
2141      *
2142      *
2143      * <pre>
2144      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2145      * password to the user provided key. For the self-signed certificate, this
2146      * password is generated by Dataproc.
2147      * </pre>
2148      *
2149      * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
2150      *
2151      * @return The keyPasswordUri.
2152      */
getKeyPasswordUri()2153     public java.lang.String getKeyPasswordUri() {
2154       java.lang.Object ref = keyPasswordUri_;
2155       if (!(ref instanceof java.lang.String)) {
2156         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2157         java.lang.String s = bs.toStringUtf8();
2158         keyPasswordUri_ = s;
2159         return s;
2160       } else {
2161         return (java.lang.String) ref;
2162       }
2163     }
2164     /**
2165      *
2166      *
2167      * <pre>
2168      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2169      * password to the user provided key. For the self-signed certificate, this
2170      * password is generated by Dataproc.
2171      * </pre>
2172      *
2173      * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
2174      *
2175      * @return The bytes for keyPasswordUri.
2176      */
getKeyPasswordUriBytes()2177     public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
2178       java.lang.Object ref = keyPasswordUri_;
2179       if (ref instanceof String) {
2180         com.google.protobuf.ByteString b =
2181             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2182         keyPasswordUri_ = b;
2183         return b;
2184       } else {
2185         return (com.google.protobuf.ByteString) ref;
2186       }
2187     }
2188     /**
2189      *
2190      *
2191      * <pre>
2192      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2193      * password to the user provided key. For the self-signed certificate, this
2194      * password is generated by Dataproc.
2195      * </pre>
2196      *
2197      * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
2198      *
2199      * @param value The keyPasswordUri to set.
2200      * @return This builder for chaining.
2201      */
setKeyPasswordUri(java.lang.String value)2202     public Builder setKeyPasswordUri(java.lang.String value) {
2203       if (value == null) {
2204         throw new NullPointerException();
2205       }
2206       keyPasswordUri_ = value;
2207       bitField0_ |= 0x00000040;
2208       onChanged();
2209       return this;
2210     }
2211     /**
2212      *
2213      *
2214      * <pre>
2215      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2216      * password to the user provided key. For the self-signed certificate, this
2217      * password is generated by Dataproc.
2218      * </pre>
2219      *
2220      * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
2221      *
2222      * @return This builder for chaining.
2223      */
clearKeyPasswordUri()2224     public Builder clearKeyPasswordUri() {
2225       keyPasswordUri_ = getDefaultInstance().getKeyPasswordUri();
2226       bitField0_ = (bitField0_ & ~0x00000040);
2227       onChanged();
2228       return this;
2229     }
2230     /**
2231      *
2232      *
2233      * <pre>
2234      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2235      * password to the user provided key. For the self-signed certificate, this
2236      * password is generated by Dataproc.
2237      * </pre>
2238      *
2239      * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
2240      *
2241      * @param value The bytes for keyPasswordUri to set.
2242      * @return This builder for chaining.
2243      */
setKeyPasswordUriBytes(com.google.protobuf.ByteString value)2244     public Builder setKeyPasswordUriBytes(com.google.protobuf.ByteString value) {
2245       if (value == null) {
2246         throw new NullPointerException();
2247       }
2248       checkByteStringIsUtf8(value);
2249       keyPasswordUri_ = value;
2250       bitField0_ |= 0x00000040;
2251       onChanged();
2252       return this;
2253     }
2254 
2255     private java.lang.Object truststorePasswordUri_ = "";
2256     /**
2257      *
2258      *
2259      * <pre>
2260      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2261      * password to the user provided truststore. For the self-signed certificate,
2262      * this password is generated by Dataproc.
2263      * </pre>
2264      *
2265      * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
2266      *
2267      * @return The truststorePasswordUri.
2268      */
getTruststorePasswordUri()2269     public java.lang.String getTruststorePasswordUri() {
2270       java.lang.Object ref = truststorePasswordUri_;
2271       if (!(ref instanceof java.lang.String)) {
2272         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2273         java.lang.String s = bs.toStringUtf8();
2274         truststorePasswordUri_ = s;
2275         return s;
2276       } else {
2277         return (java.lang.String) ref;
2278       }
2279     }
2280     /**
2281      *
2282      *
2283      * <pre>
2284      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2285      * password to the user provided truststore. For the self-signed certificate,
2286      * this password is generated by Dataproc.
2287      * </pre>
2288      *
2289      * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
2290      *
2291      * @return The bytes for truststorePasswordUri.
2292      */
getTruststorePasswordUriBytes()2293     public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
2294       java.lang.Object ref = truststorePasswordUri_;
2295       if (ref instanceof String) {
2296         com.google.protobuf.ByteString b =
2297             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2298         truststorePasswordUri_ = b;
2299         return b;
2300       } else {
2301         return (com.google.protobuf.ByteString) ref;
2302       }
2303     }
2304     /**
2305      *
2306      *
2307      * <pre>
2308      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2309      * password to the user provided truststore. For the self-signed certificate,
2310      * this password is generated by Dataproc.
2311      * </pre>
2312      *
2313      * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
2314      *
2315      * @param value The truststorePasswordUri to set.
2316      * @return This builder for chaining.
2317      */
setTruststorePasswordUri(java.lang.String value)2318     public Builder setTruststorePasswordUri(java.lang.String value) {
2319       if (value == null) {
2320         throw new NullPointerException();
2321       }
2322       truststorePasswordUri_ = value;
2323       bitField0_ |= 0x00000080;
2324       onChanged();
2325       return this;
2326     }
2327     /**
2328      *
2329      *
2330      * <pre>
2331      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2332      * password to the user provided truststore. For the self-signed certificate,
2333      * this password is generated by Dataproc.
2334      * </pre>
2335      *
2336      * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
2337      *
2338      * @return This builder for chaining.
2339      */
clearTruststorePasswordUri()2340     public Builder clearTruststorePasswordUri() {
2341       truststorePasswordUri_ = getDefaultInstance().getTruststorePasswordUri();
2342       bitField0_ = (bitField0_ & ~0x00000080);
2343       onChanged();
2344       return this;
2345     }
2346     /**
2347      *
2348      *
2349      * <pre>
2350      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2351      * password to the user provided truststore. For the self-signed certificate,
2352      * this password is generated by Dataproc.
2353      * </pre>
2354      *
2355      * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
2356      *
2357      * @param value The bytes for truststorePasswordUri to set.
2358      * @return This builder for chaining.
2359      */
setTruststorePasswordUriBytes(com.google.protobuf.ByteString value)2360     public Builder setTruststorePasswordUriBytes(com.google.protobuf.ByteString value) {
2361       if (value == null) {
2362         throw new NullPointerException();
2363       }
2364       checkByteStringIsUtf8(value);
2365       truststorePasswordUri_ = value;
2366       bitField0_ |= 0x00000080;
2367       onChanged();
2368       return this;
2369     }
2370 
2371     private java.lang.Object crossRealmTrustRealm_ = "";
2372     /**
2373      *
2374      *
2375      * <pre>
2376      * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
2377      * the user enable cross realm trust.
2378      * </pre>
2379      *
2380      * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
2381      *
2382      * @return The crossRealmTrustRealm.
2383      */
getCrossRealmTrustRealm()2384     public java.lang.String getCrossRealmTrustRealm() {
2385       java.lang.Object ref = crossRealmTrustRealm_;
2386       if (!(ref instanceof java.lang.String)) {
2387         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2388         java.lang.String s = bs.toStringUtf8();
2389         crossRealmTrustRealm_ = s;
2390         return s;
2391       } else {
2392         return (java.lang.String) ref;
2393       }
2394     }
2395     /**
2396      *
2397      *
2398      * <pre>
2399      * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
2400      * the user enable cross realm trust.
2401      * </pre>
2402      *
2403      * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
2404      *
2405      * @return The bytes for crossRealmTrustRealm.
2406      */
getCrossRealmTrustRealmBytes()2407     public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
2408       java.lang.Object ref = crossRealmTrustRealm_;
2409       if (ref instanceof String) {
2410         com.google.protobuf.ByteString b =
2411             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2412         crossRealmTrustRealm_ = b;
2413         return b;
2414       } else {
2415         return (com.google.protobuf.ByteString) ref;
2416       }
2417     }
2418     /**
2419      *
2420      *
2421      * <pre>
2422      * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
2423      * the user enable cross realm trust.
2424      * </pre>
2425      *
2426      * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
2427      *
2428      * @param value The crossRealmTrustRealm to set.
2429      * @return This builder for chaining.
2430      */
setCrossRealmTrustRealm(java.lang.String value)2431     public Builder setCrossRealmTrustRealm(java.lang.String value) {
2432       if (value == null) {
2433         throw new NullPointerException();
2434       }
2435       crossRealmTrustRealm_ = value;
2436       bitField0_ |= 0x00000100;
2437       onChanged();
2438       return this;
2439     }
2440     /**
2441      *
2442      *
2443      * <pre>
2444      * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
2445      * the user enable cross realm trust.
2446      * </pre>
2447      *
2448      * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
2449      *
2450      * @return This builder for chaining.
2451      */
clearCrossRealmTrustRealm()2452     public Builder clearCrossRealmTrustRealm() {
2453       crossRealmTrustRealm_ = getDefaultInstance().getCrossRealmTrustRealm();
2454       bitField0_ = (bitField0_ & ~0x00000100);
2455       onChanged();
2456       return this;
2457     }
2458     /**
2459      *
2460      *
2461      * <pre>
2462      * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
2463      * the user enable cross realm trust.
2464      * </pre>
2465      *
2466      * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
2467      *
2468      * @param value The bytes for crossRealmTrustRealm to set.
2469      * @return This builder for chaining.
2470      */
setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value)2471     public Builder setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value) {
2472       if (value == null) {
2473         throw new NullPointerException();
2474       }
2475       checkByteStringIsUtf8(value);
2476       crossRealmTrustRealm_ = value;
2477       bitField0_ |= 0x00000100;
2478       onChanged();
2479       return this;
2480     }
2481 
2482     private java.lang.Object crossRealmTrustKdc_ = "";
2483     /**
2484      *
2485      *
2486      * <pre>
2487      * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
2488      * realm trust relationship.
2489      * </pre>
2490      *
2491      * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
2492      *
2493      * @return The crossRealmTrustKdc.
2494      */
getCrossRealmTrustKdc()2495     public java.lang.String getCrossRealmTrustKdc() {
2496       java.lang.Object ref = crossRealmTrustKdc_;
2497       if (!(ref instanceof java.lang.String)) {
2498         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2499         java.lang.String s = bs.toStringUtf8();
2500         crossRealmTrustKdc_ = s;
2501         return s;
2502       } else {
2503         return (java.lang.String) ref;
2504       }
2505     }
2506     /**
2507      *
2508      *
2509      * <pre>
2510      * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
2511      * realm trust relationship.
2512      * </pre>
2513      *
2514      * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
2515      *
2516      * @return The bytes for crossRealmTrustKdc.
2517      */
getCrossRealmTrustKdcBytes()2518     public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
2519       java.lang.Object ref = crossRealmTrustKdc_;
2520       if (ref instanceof String) {
2521         com.google.protobuf.ByteString b =
2522             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2523         crossRealmTrustKdc_ = b;
2524         return b;
2525       } else {
2526         return (com.google.protobuf.ByteString) ref;
2527       }
2528     }
2529     /**
2530      *
2531      *
2532      * <pre>
2533      * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
2534      * realm trust relationship.
2535      * </pre>
2536      *
2537      * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
2538      *
2539      * @param value The crossRealmTrustKdc to set.
2540      * @return This builder for chaining.
2541      */
setCrossRealmTrustKdc(java.lang.String value)2542     public Builder setCrossRealmTrustKdc(java.lang.String value) {
2543       if (value == null) {
2544         throw new NullPointerException();
2545       }
2546       crossRealmTrustKdc_ = value;
2547       bitField0_ |= 0x00000200;
2548       onChanged();
2549       return this;
2550     }
2551     /**
2552      *
2553      *
2554      * <pre>
2555      * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
2556      * realm trust relationship.
2557      * </pre>
2558      *
2559      * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
2560      *
2561      * @return This builder for chaining.
2562      */
clearCrossRealmTrustKdc()2563     public Builder clearCrossRealmTrustKdc() {
2564       crossRealmTrustKdc_ = getDefaultInstance().getCrossRealmTrustKdc();
2565       bitField0_ = (bitField0_ & ~0x00000200);
2566       onChanged();
2567       return this;
2568     }
2569     /**
2570      *
2571      *
2572      * <pre>
2573      * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
2574      * realm trust relationship.
2575      * </pre>
2576      *
2577      * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
2578      *
2579      * @param value The bytes for crossRealmTrustKdc to set.
2580      * @return This builder for chaining.
2581      */
setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value)2582     public Builder setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value) {
2583       if (value == null) {
2584         throw new NullPointerException();
2585       }
2586       checkByteStringIsUtf8(value);
2587       crossRealmTrustKdc_ = value;
2588       bitField0_ |= 0x00000200;
2589       onChanged();
2590       return this;
2591     }
2592 
2593     private java.lang.Object crossRealmTrustAdminServer_ = "";
2594     /**
2595      *
2596      *
2597      * <pre>
2598      * Optional. The admin server (IP or hostname) for the remote trusted realm in
2599      * a cross realm trust relationship.
2600      * </pre>
2601      *
2602      * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
2603      * </code>
2604      *
2605      * @return The crossRealmTrustAdminServer.
2606      */
getCrossRealmTrustAdminServer()2607     public java.lang.String getCrossRealmTrustAdminServer() {
2608       java.lang.Object ref = crossRealmTrustAdminServer_;
2609       if (!(ref instanceof java.lang.String)) {
2610         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2611         java.lang.String s = bs.toStringUtf8();
2612         crossRealmTrustAdminServer_ = s;
2613         return s;
2614       } else {
2615         return (java.lang.String) ref;
2616       }
2617     }
2618     /**
2619      *
2620      *
2621      * <pre>
2622      * Optional. The admin server (IP or hostname) for the remote trusted realm in
2623      * a cross realm trust relationship.
2624      * </pre>
2625      *
2626      * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
2627      * </code>
2628      *
2629      * @return The bytes for crossRealmTrustAdminServer.
2630      */
getCrossRealmTrustAdminServerBytes()2631     public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
2632       java.lang.Object ref = crossRealmTrustAdminServer_;
2633       if (ref instanceof String) {
2634         com.google.protobuf.ByteString b =
2635             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2636         crossRealmTrustAdminServer_ = b;
2637         return b;
2638       } else {
2639         return (com.google.protobuf.ByteString) ref;
2640       }
2641     }
2642     /**
2643      *
2644      *
2645      * <pre>
2646      * Optional. The admin server (IP or hostname) for the remote trusted realm in
2647      * a cross realm trust relationship.
2648      * </pre>
2649      *
2650      * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
2651      * </code>
2652      *
2653      * @param value The crossRealmTrustAdminServer to set.
2654      * @return This builder for chaining.
2655      */
setCrossRealmTrustAdminServer(java.lang.String value)2656     public Builder setCrossRealmTrustAdminServer(java.lang.String value) {
2657       if (value == null) {
2658         throw new NullPointerException();
2659       }
2660       crossRealmTrustAdminServer_ = value;
2661       bitField0_ |= 0x00000400;
2662       onChanged();
2663       return this;
2664     }
2665     /**
2666      *
2667      *
2668      * <pre>
2669      * Optional. The admin server (IP or hostname) for the remote trusted realm in
2670      * a cross realm trust relationship.
2671      * </pre>
2672      *
2673      * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
2674      * </code>
2675      *
2676      * @return This builder for chaining.
2677      */
clearCrossRealmTrustAdminServer()2678     public Builder clearCrossRealmTrustAdminServer() {
2679       crossRealmTrustAdminServer_ = getDefaultInstance().getCrossRealmTrustAdminServer();
2680       bitField0_ = (bitField0_ & ~0x00000400);
2681       onChanged();
2682       return this;
2683     }
2684     /**
2685      *
2686      *
2687      * <pre>
2688      * Optional. The admin server (IP or hostname) for the remote trusted realm in
2689      * a cross realm trust relationship.
2690      * </pre>
2691      *
2692      * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
2693      * </code>
2694      *
2695      * @param value The bytes for crossRealmTrustAdminServer to set.
2696      * @return This builder for chaining.
2697      */
setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value)2698     public Builder setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value) {
2699       if (value == null) {
2700         throw new NullPointerException();
2701       }
2702       checkByteStringIsUtf8(value);
2703       crossRealmTrustAdminServer_ = value;
2704       bitField0_ |= 0x00000400;
2705       onChanged();
2706       return this;
2707     }
2708 
2709     private java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
2710     /**
2711      *
2712      *
2713      * <pre>
2714      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2715      * shared password between the on-cluster Kerberos realm and the remote
2716      * trusted realm, in a cross realm trust relationship.
2717      * </pre>
2718      *
2719      * <code>
2720      * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
2721      * </code>
2722      *
2723      * @return The crossRealmTrustSharedPasswordUri.
2724      */
getCrossRealmTrustSharedPasswordUri()2725     public java.lang.String getCrossRealmTrustSharedPasswordUri() {
2726       java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
2727       if (!(ref instanceof java.lang.String)) {
2728         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2729         java.lang.String s = bs.toStringUtf8();
2730         crossRealmTrustSharedPasswordUri_ = s;
2731         return s;
2732       } else {
2733         return (java.lang.String) ref;
2734       }
2735     }
2736     /**
2737      *
2738      *
2739      * <pre>
2740      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2741      * shared password between the on-cluster Kerberos realm and the remote
2742      * trusted realm, in a cross realm trust relationship.
2743      * </pre>
2744      *
2745      * <code>
2746      * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
2747      * </code>
2748      *
2749      * @return The bytes for crossRealmTrustSharedPasswordUri.
2750      */
getCrossRealmTrustSharedPasswordUriBytes()2751     public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
2752       java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
2753       if (ref instanceof String) {
2754         com.google.protobuf.ByteString b =
2755             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2756         crossRealmTrustSharedPasswordUri_ = b;
2757         return b;
2758       } else {
2759         return (com.google.protobuf.ByteString) ref;
2760       }
2761     }
2762     /**
2763      *
2764      *
2765      * <pre>
2766      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2767      * shared password between the on-cluster Kerberos realm and the remote
2768      * trusted realm, in a cross realm trust relationship.
2769      * </pre>
2770      *
2771      * <code>
2772      * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
2773      * </code>
2774      *
2775      * @param value The crossRealmTrustSharedPasswordUri to set.
2776      * @return This builder for chaining.
2777      */
setCrossRealmTrustSharedPasswordUri(java.lang.String value)2778     public Builder setCrossRealmTrustSharedPasswordUri(java.lang.String value) {
2779       if (value == null) {
2780         throw new NullPointerException();
2781       }
2782       crossRealmTrustSharedPasswordUri_ = value;
2783       bitField0_ |= 0x00000800;
2784       onChanged();
2785       return this;
2786     }
2787     /**
2788      *
2789      *
2790      * <pre>
2791      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2792      * shared password between the on-cluster Kerberos realm and the remote
2793      * trusted realm, in a cross realm trust relationship.
2794      * </pre>
2795      *
2796      * <code>
2797      * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
2798      * </code>
2799      *
2800      * @return This builder for chaining.
2801      */
clearCrossRealmTrustSharedPasswordUri()2802     public Builder clearCrossRealmTrustSharedPasswordUri() {
2803       crossRealmTrustSharedPasswordUri_ =
2804           getDefaultInstance().getCrossRealmTrustSharedPasswordUri();
2805       bitField0_ = (bitField0_ & ~0x00000800);
2806       onChanged();
2807       return this;
2808     }
2809     /**
2810      *
2811      *
2812      * <pre>
2813      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2814      * shared password between the on-cluster Kerberos realm and the remote
2815      * trusted realm, in a cross realm trust relationship.
2816      * </pre>
2817      *
2818      * <code>
2819      * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
2820      * </code>
2821      *
2822      * @param value The bytes for crossRealmTrustSharedPasswordUri to set.
2823      * @return This builder for chaining.
2824      */
setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value)2825     public Builder setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value) {
2826       if (value == null) {
2827         throw new NullPointerException();
2828       }
2829       checkByteStringIsUtf8(value);
2830       crossRealmTrustSharedPasswordUri_ = value;
2831       bitField0_ |= 0x00000800;
2832       onChanged();
2833       return this;
2834     }
2835 
2836     private java.lang.Object kdcDbKeyUri_ = "";
2837     /**
2838      *
2839      *
2840      * <pre>
2841      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2842      * master key of the KDC database.
2843      * </pre>
2844      *
2845      * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
2846      *
2847      * @return The kdcDbKeyUri.
2848      */
getKdcDbKeyUri()2849     public java.lang.String getKdcDbKeyUri() {
2850       java.lang.Object ref = kdcDbKeyUri_;
2851       if (!(ref instanceof java.lang.String)) {
2852         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
2853         java.lang.String s = bs.toStringUtf8();
2854         kdcDbKeyUri_ = s;
2855         return s;
2856       } else {
2857         return (java.lang.String) ref;
2858       }
2859     }
2860     /**
2861      *
2862      *
2863      * <pre>
2864      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2865      * master key of the KDC database.
2866      * </pre>
2867      *
2868      * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
2869      *
2870      * @return The bytes for kdcDbKeyUri.
2871      */
getKdcDbKeyUriBytes()2872     public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
2873       java.lang.Object ref = kdcDbKeyUri_;
2874       if (ref instanceof String) {
2875         com.google.protobuf.ByteString b =
2876             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
2877         kdcDbKeyUri_ = b;
2878         return b;
2879       } else {
2880         return (com.google.protobuf.ByteString) ref;
2881       }
2882     }
2883     /**
2884      *
2885      *
2886      * <pre>
2887      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2888      * master key of the KDC database.
2889      * </pre>
2890      *
2891      * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
2892      *
2893      * @param value The kdcDbKeyUri to set.
2894      * @return This builder for chaining.
2895      */
setKdcDbKeyUri(java.lang.String value)2896     public Builder setKdcDbKeyUri(java.lang.String value) {
2897       if (value == null) {
2898         throw new NullPointerException();
2899       }
2900       kdcDbKeyUri_ = value;
2901       bitField0_ |= 0x00001000;
2902       onChanged();
2903       return this;
2904     }
2905     /**
2906      *
2907      *
2908      * <pre>
2909      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2910      * master key of the KDC database.
2911      * </pre>
2912      *
2913      * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
2914      *
2915      * @return This builder for chaining.
2916      */
clearKdcDbKeyUri()2917     public Builder clearKdcDbKeyUri() {
2918       kdcDbKeyUri_ = getDefaultInstance().getKdcDbKeyUri();
2919       bitField0_ = (bitField0_ & ~0x00001000);
2920       onChanged();
2921       return this;
2922     }
2923     /**
2924      *
2925      *
2926      * <pre>
2927      * Optional. The Cloud Storage URI of a KMS encrypted file containing the
2928      * master key of the KDC database.
2929      * </pre>
2930      *
2931      * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
2932      *
2933      * @param value The bytes for kdcDbKeyUri to set.
2934      * @return This builder for chaining.
2935      */
setKdcDbKeyUriBytes(com.google.protobuf.ByteString value)2936     public Builder setKdcDbKeyUriBytes(com.google.protobuf.ByteString value) {
2937       if (value == null) {
2938         throw new NullPointerException();
2939       }
2940       checkByteStringIsUtf8(value);
2941       kdcDbKeyUri_ = value;
2942       bitField0_ |= 0x00001000;
2943       onChanged();
2944       return this;
2945     }
2946 
2947     private int tgtLifetimeHours_;
2948     /**
2949      *
2950      *
2951      * <pre>
2952      * Optional. The lifetime of the ticket granting ticket, in hours.
2953      * If not specified, or user specifies 0, then default value 10
2954      * will be used.
2955      * </pre>
2956      *
2957      * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
2958      *
2959      * @return The tgtLifetimeHours.
2960      */
2961     @java.lang.Override
getTgtLifetimeHours()2962     public int getTgtLifetimeHours() {
2963       return tgtLifetimeHours_;
2964     }
2965     /**
2966      *
2967      *
2968      * <pre>
2969      * Optional. The lifetime of the ticket granting ticket, in hours.
2970      * If not specified, or user specifies 0, then default value 10
2971      * will be used.
2972      * </pre>
2973      *
2974      * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
2975      *
2976      * @param value The tgtLifetimeHours to set.
2977      * @return This builder for chaining.
2978      */
setTgtLifetimeHours(int value)2979     public Builder setTgtLifetimeHours(int value) {
2980 
2981       tgtLifetimeHours_ = value;
2982       bitField0_ |= 0x00002000;
2983       onChanged();
2984       return this;
2985     }
2986     /**
2987      *
2988      *
2989      * <pre>
2990      * Optional. The lifetime of the ticket granting ticket, in hours.
2991      * If not specified, or user specifies 0, then default value 10
2992      * will be used.
2993      * </pre>
2994      *
2995      * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
2996      *
2997      * @return This builder for chaining.
2998      */
clearTgtLifetimeHours()2999     public Builder clearTgtLifetimeHours() {
3000       bitField0_ = (bitField0_ & ~0x00002000);
3001       tgtLifetimeHours_ = 0;
3002       onChanged();
3003       return this;
3004     }
3005 
3006     private java.lang.Object realm_ = "";
3007     /**
3008      *
3009      *
3010      * <pre>
3011      * Optional. The name of the on-cluster Kerberos realm.
3012      * If not specified, the uppercased domain of hostnames will be the realm.
3013      * </pre>
3014      *
3015      * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
3016      *
3017      * @return The realm.
3018      */
getRealm()3019     public java.lang.String getRealm() {
3020       java.lang.Object ref = realm_;
3021       if (!(ref instanceof java.lang.String)) {
3022         com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
3023         java.lang.String s = bs.toStringUtf8();
3024         realm_ = s;
3025         return s;
3026       } else {
3027         return (java.lang.String) ref;
3028       }
3029     }
3030     /**
3031      *
3032      *
3033      * <pre>
3034      * Optional. The name of the on-cluster Kerberos realm.
3035      * If not specified, the uppercased domain of hostnames will be the realm.
3036      * </pre>
3037      *
3038      * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
3039      *
3040      * @return The bytes for realm.
3041      */
getRealmBytes()3042     public com.google.protobuf.ByteString getRealmBytes() {
3043       java.lang.Object ref = realm_;
3044       if (ref instanceof String) {
3045         com.google.protobuf.ByteString b =
3046             com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
3047         realm_ = b;
3048         return b;
3049       } else {
3050         return (com.google.protobuf.ByteString) ref;
3051       }
3052     }
3053     /**
3054      *
3055      *
3056      * <pre>
3057      * Optional. The name of the on-cluster Kerberos realm.
3058      * If not specified, the uppercased domain of hostnames will be the realm.
3059      * </pre>
3060      *
3061      * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
3062      *
3063      * @param value The realm to set.
3064      * @return This builder for chaining.
3065      */
setRealm(java.lang.String value)3066     public Builder setRealm(java.lang.String value) {
3067       if (value == null) {
3068         throw new NullPointerException();
3069       }
3070       realm_ = value;
3071       bitField0_ |= 0x00004000;
3072       onChanged();
3073       return this;
3074     }
3075     /**
3076      *
3077      *
3078      * <pre>
3079      * Optional. The name of the on-cluster Kerberos realm.
3080      * If not specified, the uppercased domain of hostnames will be the realm.
3081      * </pre>
3082      *
3083      * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
3084      *
3085      * @return This builder for chaining.
3086      */
clearRealm()3087     public Builder clearRealm() {
3088       realm_ = getDefaultInstance().getRealm();
3089       bitField0_ = (bitField0_ & ~0x00004000);
3090       onChanged();
3091       return this;
3092     }
3093     /**
3094      *
3095      *
3096      * <pre>
3097      * Optional. The name of the on-cluster Kerberos realm.
3098      * If not specified, the uppercased domain of hostnames will be the realm.
3099      * </pre>
3100      *
3101      * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
3102      *
3103      * @param value The bytes for realm to set.
3104      * @return This builder for chaining.
3105      */
setRealmBytes(com.google.protobuf.ByteString value)3106     public Builder setRealmBytes(com.google.protobuf.ByteString value) {
3107       if (value == null) {
3108         throw new NullPointerException();
3109       }
3110       checkByteStringIsUtf8(value);
3111       realm_ = value;
3112       bitField0_ |= 0x00004000;
3113       onChanged();
3114       return this;
3115     }
3116 
3117     @java.lang.Override
setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields)3118     public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
3119       return super.setUnknownFields(unknownFields);
3120     }
3121 
3122     @java.lang.Override
mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields)3123     public final Builder mergeUnknownFields(
3124         final com.google.protobuf.UnknownFieldSet unknownFields) {
3125       return super.mergeUnknownFields(unknownFields);
3126     }
3127 
3128     // @@protoc_insertion_point(builder_scope:google.cloud.dataproc.v1.KerberosConfig)
3129   }
3130 
3131   // @@protoc_insertion_point(class_scope:google.cloud.dataproc.v1.KerberosConfig)
3132   private static final com.google.cloud.dataproc.v1.KerberosConfig DEFAULT_INSTANCE;
3133 
3134   static {
3135     DEFAULT_INSTANCE = new com.google.cloud.dataproc.v1.KerberosConfig();
3136   }
3137 
getDefaultInstance()3138   public static com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstance() {
3139     return DEFAULT_INSTANCE;
3140   }
3141 
3142   private static final com.google.protobuf.Parser<KerberosConfig> PARSER =
3143       new com.google.protobuf.AbstractParser<KerberosConfig>() {
3144         @java.lang.Override
3145         public KerberosConfig parsePartialFrom(
3146             com.google.protobuf.CodedInputStream input,
3147             com.google.protobuf.ExtensionRegistryLite extensionRegistry)
3148             throws com.google.protobuf.InvalidProtocolBufferException {
3149           Builder builder = newBuilder();
3150           try {
3151             builder.mergeFrom(input, extensionRegistry);
3152           } catch (com.google.protobuf.InvalidProtocolBufferException e) {
3153             throw e.setUnfinishedMessage(builder.buildPartial());
3154           } catch (com.google.protobuf.UninitializedMessageException e) {
3155             throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
3156           } catch (java.io.IOException e) {
3157             throw new com.google.protobuf.InvalidProtocolBufferException(e)
3158                 .setUnfinishedMessage(builder.buildPartial());
3159           }
3160           return builder.buildPartial();
3161         }
3162       };
3163 
parser()3164   public static com.google.protobuf.Parser<KerberosConfig> parser() {
3165     return PARSER;
3166   }
3167 
3168   @java.lang.Override
getParserForType()3169   public com.google.protobuf.Parser<KerberosConfig> getParserForType() {
3170     return PARSER;
3171   }
3172 
3173   @java.lang.Override
getDefaultInstanceForType()3174   public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
3175     return DEFAULT_INSTANCE;
3176   }
3177 }
3178