1 /* 2 * Copyright 2020 Google LLC 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * https://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 // Generated by the protocol buffer compiler. DO NOT EDIT! 17 // source: google/cloud/dataproc/v1/clusters.proto 18 19 package com.google.cloud.dataproc.v1; 20 21 /** 22 * 23 * 24 * <pre> 25 * Specifies Kerberos related configuration. 26 * </pre> 27 * 28 * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig} 29 */ 30 public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3 31 implements 32 // @@protoc_insertion_point(message_implements:google.cloud.dataproc.v1.KerberosConfig) 33 KerberosConfigOrBuilder { 34 private static final long serialVersionUID = 0L; 35 // Use KerberosConfig.newBuilder() to construct. KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder<?> builder)36 private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { 37 super(builder); 38 } 39 KerberosConfig()40 private KerberosConfig() { 41 rootPrincipalPasswordUri_ = ""; 42 kmsKeyUri_ = ""; 43 keystoreUri_ = ""; 44 truststoreUri_ = ""; 45 keystorePasswordUri_ = ""; 46 keyPasswordUri_ = ""; 47 truststorePasswordUri_ = ""; 48 crossRealmTrustRealm_ = ""; 49 crossRealmTrustKdc_ = ""; 50 crossRealmTrustAdminServer_ = ""; 51 crossRealmTrustSharedPasswordUri_ = ""; 52 kdcDbKeyUri_ = ""; 53 realm_ = ""; 54 } 55 56 @java.lang.Override 57 @SuppressWarnings({"unused"}) newInstance(UnusedPrivateParameter unused)58 protected java.lang.Object newInstance(UnusedPrivateParameter unused) { 59 return new KerberosConfig(); 60 } 61 62 @java.lang.Override getUnknownFields()63 public final com.google.protobuf.UnknownFieldSet getUnknownFields() { 64 return this.unknownFields; 65 } 66 getDescriptor()67 public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { 68 return com.google.cloud.dataproc.v1.ClustersProto 69 .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; 70 } 71 72 @java.lang.Override 73 protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()74 internalGetFieldAccessorTable() { 75 return com.google.cloud.dataproc.v1.ClustersProto 76 .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable 77 .ensureFieldAccessorsInitialized( 78 com.google.cloud.dataproc.v1.KerberosConfig.class, 79 com.google.cloud.dataproc.v1.KerberosConfig.Builder.class); 80 } 81 82 public static final int ENABLE_KERBEROS_FIELD_NUMBER = 1; 83 private boolean enableKerberos_ = false; 84 /** 85 * 86 * 87 * <pre> 88 * Optional. Flag to indicate whether to Kerberize the cluster (default: 89 * false). Set this field to true to enable Kerberos on a cluster. 90 * </pre> 91 * 92 * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code> 93 * 94 * @return The enableKerberos. 95 */ 96 @java.lang.Override getEnableKerberos()97 public boolean getEnableKerberos() { 98 return enableKerberos_; 99 } 100 101 public static final int ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER = 2; 102 103 @SuppressWarnings("serial") 104 private volatile java.lang.Object rootPrincipalPasswordUri_ = ""; 105 /** 106 * 107 * 108 * <pre> 109 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 110 * principal password. 111 * </pre> 112 * 113 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code> 114 * 115 * @return The rootPrincipalPasswordUri. 116 */ 117 @java.lang.Override getRootPrincipalPasswordUri()118 public java.lang.String getRootPrincipalPasswordUri() { 119 java.lang.Object ref = rootPrincipalPasswordUri_; 120 if (ref instanceof java.lang.String) { 121 return (java.lang.String) ref; 122 } else { 123 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 124 java.lang.String s = bs.toStringUtf8(); 125 rootPrincipalPasswordUri_ = s; 126 return s; 127 } 128 } 129 /** 130 * 131 * 132 * <pre> 133 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 134 * principal password. 135 * </pre> 136 * 137 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code> 138 * 139 * @return The bytes for rootPrincipalPasswordUri. 140 */ 141 @java.lang.Override getRootPrincipalPasswordUriBytes()142 public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() { 143 java.lang.Object ref = rootPrincipalPasswordUri_; 144 if (ref instanceof java.lang.String) { 145 com.google.protobuf.ByteString b = 146 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 147 rootPrincipalPasswordUri_ = b; 148 return b; 149 } else { 150 return (com.google.protobuf.ByteString) ref; 151 } 152 } 153 154 public static final int KMS_KEY_URI_FIELD_NUMBER = 3; 155 156 @SuppressWarnings("serial") 157 private volatile java.lang.Object kmsKeyUri_ = ""; 158 /** 159 * 160 * 161 * <pre> 162 * Optional. The uri of the KMS key used to encrypt various sensitive 163 * files. 164 * </pre> 165 * 166 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 167 * 168 * @return The kmsKeyUri. 169 */ 170 @java.lang.Override getKmsKeyUri()171 public java.lang.String getKmsKeyUri() { 172 java.lang.Object ref = kmsKeyUri_; 173 if (ref instanceof java.lang.String) { 174 return (java.lang.String) ref; 175 } else { 176 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 177 java.lang.String s = bs.toStringUtf8(); 178 kmsKeyUri_ = s; 179 return s; 180 } 181 } 182 /** 183 * 184 * 185 * <pre> 186 * Optional. The uri of the KMS key used to encrypt various sensitive 187 * files. 188 * </pre> 189 * 190 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 191 * 192 * @return The bytes for kmsKeyUri. 193 */ 194 @java.lang.Override getKmsKeyUriBytes()195 public com.google.protobuf.ByteString getKmsKeyUriBytes() { 196 java.lang.Object ref = kmsKeyUri_; 197 if (ref instanceof java.lang.String) { 198 com.google.protobuf.ByteString b = 199 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 200 kmsKeyUri_ = b; 201 return b; 202 } else { 203 return (com.google.protobuf.ByteString) ref; 204 } 205 } 206 207 public static final int KEYSTORE_URI_FIELD_NUMBER = 4; 208 209 @SuppressWarnings("serial") 210 private volatile java.lang.Object keystoreUri_ = ""; 211 /** 212 * 213 * 214 * <pre> 215 * Optional. The Cloud Storage URI of the keystore file used for SSL 216 * encryption. If not provided, Dataproc will provide a self-signed 217 * certificate. 218 * </pre> 219 * 220 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 221 * 222 * @return The keystoreUri. 223 */ 224 @java.lang.Override getKeystoreUri()225 public java.lang.String getKeystoreUri() { 226 java.lang.Object ref = keystoreUri_; 227 if (ref instanceof java.lang.String) { 228 return (java.lang.String) ref; 229 } else { 230 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 231 java.lang.String s = bs.toStringUtf8(); 232 keystoreUri_ = s; 233 return s; 234 } 235 } 236 /** 237 * 238 * 239 * <pre> 240 * Optional. The Cloud Storage URI of the keystore file used for SSL 241 * encryption. If not provided, Dataproc will provide a self-signed 242 * certificate. 243 * </pre> 244 * 245 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 246 * 247 * @return The bytes for keystoreUri. 248 */ 249 @java.lang.Override getKeystoreUriBytes()250 public com.google.protobuf.ByteString getKeystoreUriBytes() { 251 java.lang.Object ref = keystoreUri_; 252 if (ref instanceof java.lang.String) { 253 com.google.protobuf.ByteString b = 254 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 255 keystoreUri_ = b; 256 return b; 257 } else { 258 return (com.google.protobuf.ByteString) ref; 259 } 260 } 261 262 public static final int TRUSTSTORE_URI_FIELD_NUMBER = 5; 263 264 @SuppressWarnings("serial") 265 private volatile java.lang.Object truststoreUri_ = ""; 266 /** 267 * 268 * 269 * <pre> 270 * Optional. The Cloud Storage URI of the truststore file used for SSL 271 * encryption. If not provided, Dataproc will provide a self-signed 272 * certificate. 273 * </pre> 274 * 275 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 276 * 277 * @return The truststoreUri. 278 */ 279 @java.lang.Override getTruststoreUri()280 public java.lang.String getTruststoreUri() { 281 java.lang.Object ref = truststoreUri_; 282 if (ref instanceof java.lang.String) { 283 return (java.lang.String) ref; 284 } else { 285 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 286 java.lang.String s = bs.toStringUtf8(); 287 truststoreUri_ = s; 288 return s; 289 } 290 } 291 /** 292 * 293 * 294 * <pre> 295 * Optional. The Cloud Storage URI of the truststore file used for SSL 296 * encryption. If not provided, Dataproc will provide a self-signed 297 * certificate. 298 * </pre> 299 * 300 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 301 * 302 * @return The bytes for truststoreUri. 303 */ 304 @java.lang.Override getTruststoreUriBytes()305 public com.google.protobuf.ByteString getTruststoreUriBytes() { 306 java.lang.Object ref = truststoreUri_; 307 if (ref instanceof java.lang.String) { 308 com.google.protobuf.ByteString b = 309 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 310 truststoreUri_ = b; 311 return b; 312 } else { 313 return (com.google.protobuf.ByteString) ref; 314 } 315 } 316 317 public static final int KEYSTORE_PASSWORD_URI_FIELD_NUMBER = 6; 318 319 @SuppressWarnings("serial") 320 private volatile java.lang.Object keystorePasswordUri_ = ""; 321 /** 322 * 323 * 324 * <pre> 325 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 326 * password to the user provided keystore. For the self-signed certificate, 327 * this password is generated by Dataproc. 328 * </pre> 329 * 330 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 331 * 332 * @return The keystorePasswordUri. 333 */ 334 @java.lang.Override getKeystorePasswordUri()335 public java.lang.String getKeystorePasswordUri() { 336 java.lang.Object ref = keystorePasswordUri_; 337 if (ref instanceof java.lang.String) { 338 return (java.lang.String) ref; 339 } else { 340 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 341 java.lang.String s = bs.toStringUtf8(); 342 keystorePasswordUri_ = s; 343 return s; 344 } 345 } 346 /** 347 * 348 * 349 * <pre> 350 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 351 * password to the user provided keystore. For the self-signed certificate, 352 * this password is generated by Dataproc. 353 * </pre> 354 * 355 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 356 * 357 * @return The bytes for keystorePasswordUri. 358 */ 359 @java.lang.Override getKeystorePasswordUriBytes()360 public com.google.protobuf.ByteString getKeystorePasswordUriBytes() { 361 java.lang.Object ref = keystorePasswordUri_; 362 if (ref instanceof java.lang.String) { 363 com.google.protobuf.ByteString b = 364 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 365 keystorePasswordUri_ = b; 366 return b; 367 } else { 368 return (com.google.protobuf.ByteString) ref; 369 } 370 } 371 372 public static final int KEY_PASSWORD_URI_FIELD_NUMBER = 7; 373 374 @SuppressWarnings("serial") 375 private volatile java.lang.Object keyPasswordUri_ = ""; 376 /** 377 * 378 * 379 * <pre> 380 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 381 * password to the user provided key. For the self-signed certificate, this 382 * password is generated by Dataproc. 383 * </pre> 384 * 385 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 386 * 387 * @return The keyPasswordUri. 388 */ 389 @java.lang.Override getKeyPasswordUri()390 public java.lang.String getKeyPasswordUri() { 391 java.lang.Object ref = keyPasswordUri_; 392 if (ref instanceof java.lang.String) { 393 return (java.lang.String) ref; 394 } else { 395 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 396 java.lang.String s = bs.toStringUtf8(); 397 keyPasswordUri_ = s; 398 return s; 399 } 400 } 401 /** 402 * 403 * 404 * <pre> 405 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 406 * password to the user provided key. For the self-signed certificate, this 407 * password is generated by Dataproc. 408 * </pre> 409 * 410 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 411 * 412 * @return The bytes for keyPasswordUri. 413 */ 414 @java.lang.Override getKeyPasswordUriBytes()415 public com.google.protobuf.ByteString getKeyPasswordUriBytes() { 416 java.lang.Object ref = keyPasswordUri_; 417 if (ref instanceof java.lang.String) { 418 com.google.protobuf.ByteString b = 419 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 420 keyPasswordUri_ = b; 421 return b; 422 } else { 423 return (com.google.protobuf.ByteString) ref; 424 } 425 } 426 427 public static final int TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER = 8; 428 429 @SuppressWarnings("serial") 430 private volatile java.lang.Object truststorePasswordUri_ = ""; 431 /** 432 * 433 * 434 * <pre> 435 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 436 * password to the user provided truststore. For the self-signed certificate, 437 * this password is generated by Dataproc. 438 * </pre> 439 * 440 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 441 * 442 * @return The truststorePasswordUri. 443 */ 444 @java.lang.Override getTruststorePasswordUri()445 public java.lang.String getTruststorePasswordUri() { 446 java.lang.Object ref = truststorePasswordUri_; 447 if (ref instanceof java.lang.String) { 448 return (java.lang.String) ref; 449 } else { 450 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 451 java.lang.String s = bs.toStringUtf8(); 452 truststorePasswordUri_ = s; 453 return s; 454 } 455 } 456 /** 457 * 458 * 459 * <pre> 460 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 461 * password to the user provided truststore. For the self-signed certificate, 462 * this password is generated by Dataproc. 463 * </pre> 464 * 465 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 466 * 467 * @return The bytes for truststorePasswordUri. 468 */ 469 @java.lang.Override getTruststorePasswordUriBytes()470 public com.google.protobuf.ByteString getTruststorePasswordUriBytes() { 471 java.lang.Object ref = truststorePasswordUri_; 472 if (ref instanceof java.lang.String) { 473 com.google.protobuf.ByteString b = 474 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 475 truststorePasswordUri_ = b; 476 return b; 477 } else { 478 return (com.google.protobuf.ByteString) ref; 479 } 480 } 481 482 public static final int CROSS_REALM_TRUST_REALM_FIELD_NUMBER = 9; 483 484 @SuppressWarnings("serial") 485 private volatile java.lang.Object crossRealmTrustRealm_ = ""; 486 /** 487 * 488 * 489 * <pre> 490 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 491 * the user enable cross realm trust. 492 * </pre> 493 * 494 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 495 * 496 * @return The crossRealmTrustRealm. 497 */ 498 @java.lang.Override getCrossRealmTrustRealm()499 public java.lang.String getCrossRealmTrustRealm() { 500 java.lang.Object ref = crossRealmTrustRealm_; 501 if (ref instanceof java.lang.String) { 502 return (java.lang.String) ref; 503 } else { 504 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 505 java.lang.String s = bs.toStringUtf8(); 506 crossRealmTrustRealm_ = s; 507 return s; 508 } 509 } 510 /** 511 * 512 * 513 * <pre> 514 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 515 * the user enable cross realm trust. 516 * </pre> 517 * 518 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 519 * 520 * @return The bytes for crossRealmTrustRealm. 521 */ 522 @java.lang.Override getCrossRealmTrustRealmBytes()523 public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() { 524 java.lang.Object ref = crossRealmTrustRealm_; 525 if (ref instanceof java.lang.String) { 526 com.google.protobuf.ByteString b = 527 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 528 crossRealmTrustRealm_ = b; 529 return b; 530 } else { 531 return (com.google.protobuf.ByteString) ref; 532 } 533 } 534 535 public static final int CROSS_REALM_TRUST_KDC_FIELD_NUMBER = 10; 536 537 @SuppressWarnings("serial") 538 private volatile java.lang.Object crossRealmTrustKdc_ = ""; 539 /** 540 * 541 * 542 * <pre> 543 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 544 * realm trust relationship. 545 * </pre> 546 * 547 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 548 * 549 * @return The crossRealmTrustKdc. 550 */ 551 @java.lang.Override getCrossRealmTrustKdc()552 public java.lang.String getCrossRealmTrustKdc() { 553 java.lang.Object ref = crossRealmTrustKdc_; 554 if (ref instanceof java.lang.String) { 555 return (java.lang.String) ref; 556 } else { 557 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 558 java.lang.String s = bs.toStringUtf8(); 559 crossRealmTrustKdc_ = s; 560 return s; 561 } 562 } 563 /** 564 * 565 * 566 * <pre> 567 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 568 * realm trust relationship. 569 * </pre> 570 * 571 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 572 * 573 * @return The bytes for crossRealmTrustKdc. 574 */ 575 @java.lang.Override getCrossRealmTrustKdcBytes()576 public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() { 577 java.lang.Object ref = crossRealmTrustKdc_; 578 if (ref instanceof java.lang.String) { 579 com.google.protobuf.ByteString b = 580 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 581 crossRealmTrustKdc_ = b; 582 return b; 583 } else { 584 return (com.google.protobuf.ByteString) ref; 585 } 586 } 587 588 public static final int CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER = 11; 589 590 @SuppressWarnings("serial") 591 private volatile java.lang.Object crossRealmTrustAdminServer_ = ""; 592 /** 593 * 594 * 595 * <pre> 596 * Optional. The admin server (IP or hostname) for the remote trusted realm in 597 * a cross realm trust relationship. 598 * </pre> 599 * 600 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 601 * </code> 602 * 603 * @return The crossRealmTrustAdminServer. 604 */ 605 @java.lang.Override getCrossRealmTrustAdminServer()606 public java.lang.String getCrossRealmTrustAdminServer() { 607 java.lang.Object ref = crossRealmTrustAdminServer_; 608 if (ref instanceof java.lang.String) { 609 return (java.lang.String) ref; 610 } else { 611 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 612 java.lang.String s = bs.toStringUtf8(); 613 crossRealmTrustAdminServer_ = s; 614 return s; 615 } 616 } 617 /** 618 * 619 * 620 * <pre> 621 * Optional. The admin server (IP or hostname) for the remote trusted realm in 622 * a cross realm trust relationship. 623 * </pre> 624 * 625 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 626 * </code> 627 * 628 * @return The bytes for crossRealmTrustAdminServer. 629 */ 630 @java.lang.Override getCrossRealmTrustAdminServerBytes()631 public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() { 632 java.lang.Object ref = crossRealmTrustAdminServer_; 633 if (ref instanceof java.lang.String) { 634 com.google.protobuf.ByteString b = 635 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 636 crossRealmTrustAdminServer_ = b; 637 return b; 638 } else { 639 return (com.google.protobuf.ByteString) ref; 640 } 641 } 642 643 public static final int CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER = 12; 644 645 @SuppressWarnings("serial") 646 private volatile java.lang.Object crossRealmTrustSharedPasswordUri_ = ""; 647 /** 648 * 649 * 650 * <pre> 651 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 652 * shared password between the on-cluster Kerberos realm and the remote 653 * trusted realm, in a cross realm trust relationship. 654 * </pre> 655 * 656 * <code> 657 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 658 * </code> 659 * 660 * @return The crossRealmTrustSharedPasswordUri. 661 */ 662 @java.lang.Override getCrossRealmTrustSharedPasswordUri()663 public java.lang.String getCrossRealmTrustSharedPasswordUri() { 664 java.lang.Object ref = crossRealmTrustSharedPasswordUri_; 665 if (ref instanceof java.lang.String) { 666 return (java.lang.String) ref; 667 } else { 668 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 669 java.lang.String s = bs.toStringUtf8(); 670 crossRealmTrustSharedPasswordUri_ = s; 671 return s; 672 } 673 } 674 /** 675 * 676 * 677 * <pre> 678 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 679 * shared password between the on-cluster Kerberos realm and the remote 680 * trusted realm, in a cross realm trust relationship. 681 * </pre> 682 * 683 * <code> 684 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 685 * </code> 686 * 687 * @return The bytes for crossRealmTrustSharedPasswordUri. 688 */ 689 @java.lang.Override getCrossRealmTrustSharedPasswordUriBytes()690 public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() { 691 java.lang.Object ref = crossRealmTrustSharedPasswordUri_; 692 if (ref instanceof java.lang.String) { 693 com.google.protobuf.ByteString b = 694 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 695 crossRealmTrustSharedPasswordUri_ = b; 696 return b; 697 } else { 698 return (com.google.protobuf.ByteString) ref; 699 } 700 } 701 702 public static final int KDC_DB_KEY_URI_FIELD_NUMBER = 13; 703 704 @SuppressWarnings("serial") 705 private volatile java.lang.Object kdcDbKeyUri_ = ""; 706 /** 707 * 708 * 709 * <pre> 710 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 711 * master key of the KDC database. 712 * </pre> 713 * 714 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 715 * 716 * @return The kdcDbKeyUri. 717 */ 718 @java.lang.Override getKdcDbKeyUri()719 public java.lang.String getKdcDbKeyUri() { 720 java.lang.Object ref = kdcDbKeyUri_; 721 if (ref instanceof java.lang.String) { 722 return (java.lang.String) ref; 723 } else { 724 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 725 java.lang.String s = bs.toStringUtf8(); 726 kdcDbKeyUri_ = s; 727 return s; 728 } 729 } 730 /** 731 * 732 * 733 * <pre> 734 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 735 * master key of the KDC database. 736 * </pre> 737 * 738 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 739 * 740 * @return The bytes for kdcDbKeyUri. 741 */ 742 @java.lang.Override getKdcDbKeyUriBytes()743 public com.google.protobuf.ByteString getKdcDbKeyUriBytes() { 744 java.lang.Object ref = kdcDbKeyUri_; 745 if (ref instanceof java.lang.String) { 746 com.google.protobuf.ByteString b = 747 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 748 kdcDbKeyUri_ = b; 749 return b; 750 } else { 751 return (com.google.protobuf.ByteString) ref; 752 } 753 } 754 755 public static final int TGT_LIFETIME_HOURS_FIELD_NUMBER = 14; 756 private int tgtLifetimeHours_ = 0; 757 /** 758 * 759 * 760 * <pre> 761 * Optional. The lifetime of the ticket granting ticket, in hours. 762 * If not specified, or user specifies 0, then default value 10 763 * will be used. 764 * </pre> 765 * 766 * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code> 767 * 768 * @return The tgtLifetimeHours. 769 */ 770 @java.lang.Override getTgtLifetimeHours()771 public int getTgtLifetimeHours() { 772 return tgtLifetimeHours_; 773 } 774 775 public static final int REALM_FIELD_NUMBER = 15; 776 777 @SuppressWarnings("serial") 778 private volatile java.lang.Object realm_ = ""; 779 /** 780 * 781 * 782 * <pre> 783 * Optional. The name of the on-cluster Kerberos realm. 784 * If not specified, the uppercased domain of hostnames will be the realm. 785 * </pre> 786 * 787 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 788 * 789 * @return The realm. 790 */ 791 @java.lang.Override getRealm()792 public java.lang.String getRealm() { 793 java.lang.Object ref = realm_; 794 if (ref instanceof java.lang.String) { 795 return (java.lang.String) ref; 796 } else { 797 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 798 java.lang.String s = bs.toStringUtf8(); 799 realm_ = s; 800 return s; 801 } 802 } 803 /** 804 * 805 * 806 * <pre> 807 * Optional. The name of the on-cluster Kerberos realm. 808 * If not specified, the uppercased domain of hostnames will be the realm. 809 * </pre> 810 * 811 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 812 * 813 * @return The bytes for realm. 814 */ 815 @java.lang.Override getRealmBytes()816 public com.google.protobuf.ByteString getRealmBytes() { 817 java.lang.Object ref = realm_; 818 if (ref instanceof java.lang.String) { 819 com.google.protobuf.ByteString b = 820 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 821 realm_ = b; 822 return b; 823 } else { 824 return (com.google.protobuf.ByteString) ref; 825 } 826 } 827 828 private byte memoizedIsInitialized = -1; 829 830 @java.lang.Override isInitialized()831 public final boolean isInitialized() { 832 byte isInitialized = memoizedIsInitialized; 833 if (isInitialized == 1) return true; 834 if (isInitialized == 0) return false; 835 836 memoizedIsInitialized = 1; 837 return true; 838 } 839 840 @java.lang.Override writeTo(com.google.protobuf.CodedOutputStream output)841 public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { 842 if (enableKerberos_ != false) { 843 output.writeBool(1, enableKerberos_); 844 } 845 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) { 846 com.google.protobuf.GeneratedMessageV3.writeString(output, 2, rootPrincipalPasswordUri_); 847 } 848 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) { 849 com.google.protobuf.GeneratedMessageV3.writeString(output, 3, kmsKeyUri_); 850 } 851 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) { 852 com.google.protobuf.GeneratedMessageV3.writeString(output, 4, keystoreUri_); 853 } 854 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) { 855 com.google.protobuf.GeneratedMessageV3.writeString(output, 5, truststoreUri_); 856 } 857 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) { 858 com.google.protobuf.GeneratedMessageV3.writeString(output, 6, keystorePasswordUri_); 859 } 860 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) { 861 com.google.protobuf.GeneratedMessageV3.writeString(output, 7, keyPasswordUri_); 862 } 863 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) { 864 com.google.protobuf.GeneratedMessageV3.writeString(output, 8, truststorePasswordUri_); 865 } 866 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) { 867 com.google.protobuf.GeneratedMessageV3.writeString(output, 9, crossRealmTrustRealm_); 868 } 869 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) { 870 com.google.protobuf.GeneratedMessageV3.writeString(output, 10, crossRealmTrustKdc_); 871 } 872 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) { 873 com.google.protobuf.GeneratedMessageV3.writeString(output, 11, crossRealmTrustAdminServer_); 874 } 875 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) { 876 com.google.protobuf.GeneratedMessageV3.writeString( 877 output, 12, crossRealmTrustSharedPasswordUri_); 878 } 879 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) { 880 com.google.protobuf.GeneratedMessageV3.writeString(output, 13, kdcDbKeyUri_); 881 } 882 if (tgtLifetimeHours_ != 0) { 883 output.writeInt32(14, tgtLifetimeHours_); 884 } 885 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) { 886 com.google.protobuf.GeneratedMessageV3.writeString(output, 15, realm_); 887 } 888 getUnknownFields().writeTo(output); 889 } 890 891 @java.lang.Override getSerializedSize()892 public int getSerializedSize() { 893 int size = memoizedSize; 894 if (size != -1) return size; 895 896 size = 0; 897 if (enableKerberos_ != false) { 898 size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, enableKerberos_); 899 } 900 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) { 901 size += 902 com.google.protobuf.GeneratedMessageV3.computeStringSize(2, rootPrincipalPasswordUri_); 903 } 904 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) { 905 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, kmsKeyUri_); 906 } 907 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) { 908 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, keystoreUri_); 909 } 910 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) { 911 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, truststoreUri_); 912 } 913 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) { 914 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, keystorePasswordUri_); 915 } 916 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) { 917 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, keyPasswordUri_); 918 } 919 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) { 920 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(8, truststorePasswordUri_); 921 } 922 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) { 923 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(9, crossRealmTrustRealm_); 924 } 925 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) { 926 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(10, crossRealmTrustKdc_); 927 } 928 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) { 929 size += 930 com.google.protobuf.GeneratedMessageV3.computeStringSize(11, crossRealmTrustAdminServer_); 931 } 932 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) { 933 size += 934 com.google.protobuf.GeneratedMessageV3.computeStringSize( 935 12, crossRealmTrustSharedPasswordUri_); 936 } 937 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) { 938 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(13, kdcDbKeyUri_); 939 } 940 if (tgtLifetimeHours_ != 0) { 941 size += com.google.protobuf.CodedOutputStream.computeInt32Size(14, tgtLifetimeHours_); 942 } 943 if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) { 944 size += com.google.protobuf.GeneratedMessageV3.computeStringSize(15, realm_); 945 } 946 size += getUnknownFields().getSerializedSize(); 947 memoizedSize = size; 948 return size; 949 } 950 951 @java.lang.Override equals(final java.lang.Object obj)952 public boolean equals(final java.lang.Object obj) { 953 if (obj == this) { 954 return true; 955 } 956 if (!(obj instanceof com.google.cloud.dataproc.v1.KerberosConfig)) { 957 return super.equals(obj); 958 } 959 com.google.cloud.dataproc.v1.KerberosConfig other = 960 (com.google.cloud.dataproc.v1.KerberosConfig) obj; 961 962 if (getEnableKerberos() != other.getEnableKerberos()) return false; 963 if (!getRootPrincipalPasswordUri().equals(other.getRootPrincipalPasswordUri())) return false; 964 if (!getKmsKeyUri().equals(other.getKmsKeyUri())) return false; 965 if (!getKeystoreUri().equals(other.getKeystoreUri())) return false; 966 if (!getTruststoreUri().equals(other.getTruststoreUri())) return false; 967 if (!getKeystorePasswordUri().equals(other.getKeystorePasswordUri())) return false; 968 if (!getKeyPasswordUri().equals(other.getKeyPasswordUri())) return false; 969 if (!getTruststorePasswordUri().equals(other.getTruststorePasswordUri())) return false; 970 if (!getCrossRealmTrustRealm().equals(other.getCrossRealmTrustRealm())) return false; 971 if (!getCrossRealmTrustKdc().equals(other.getCrossRealmTrustKdc())) return false; 972 if (!getCrossRealmTrustAdminServer().equals(other.getCrossRealmTrustAdminServer())) 973 return false; 974 if (!getCrossRealmTrustSharedPasswordUri().equals(other.getCrossRealmTrustSharedPasswordUri())) 975 return false; 976 if (!getKdcDbKeyUri().equals(other.getKdcDbKeyUri())) return false; 977 if (getTgtLifetimeHours() != other.getTgtLifetimeHours()) return false; 978 if (!getRealm().equals(other.getRealm())) return false; 979 if (!getUnknownFields().equals(other.getUnknownFields())) return false; 980 return true; 981 } 982 983 @java.lang.Override hashCode()984 public int hashCode() { 985 if (memoizedHashCode != 0) { 986 return memoizedHashCode; 987 } 988 int hash = 41; 989 hash = (19 * hash) + getDescriptor().hashCode(); 990 hash = (37 * hash) + ENABLE_KERBEROS_FIELD_NUMBER; 991 hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEnableKerberos()); 992 hash = (37 * hash) + ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER; 993 hash = (53 * hash) + getRootPrincipalPasswordUri().hashCode(); 994 hash = (37 * hash) + KMS_KEY_URI_FIELD_NUMBER; 995 hash = (53 * hash) + getKmsKeyUri().hashCode(); 996 hash = (37 * hash) + KEYSTORE_URI_FIELD_NUMBER; 997 hash = (53 * hash) + getKeystoreUri().hashCode(); 998 hash = (37 * hash) + TRUSTSTORE_URI_FIELD_NUMBER; 999 hash = (53 * hash) + getTruststoreUri().hashCode(); 1000 hash = (37 * hash) + KEYSTORE_PASSWORD_URI_FIELD_NUMBER; 1001 hash = (53 * hash) + getKeystorePasswordUri().hashCode(); 1002 hash = (37 * hash) + KEY_PASSWORD_URI_FIELD_NUMBER; 1003 hash = (53 * hash) + getKeyPasswordUri().hashCode(); 1004 hash = (37 * hash) + TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER; 1005 hash = (53 * hash) + getTruststorePasswordUri().hashCode(); 1006 hash = (37 * hash) + CROSS_REALM_TRUST_REALM_FIELD_NUMBER; 1007 hash = (53 * hash) + getCrossRealmTrustRealm().hashCode(); 1008 hash = (37 * hash) + CROSS_REALM_TRUST_KDC_FIELD_NUMBER; 1009 hash = (53 * hash) + getCrossRealmTrustKdc().hashCode(); 1010 hash = (37 * hash) + CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER; 1011 hash = (53 * hash) + getCrossRealmTrustAdminServer().hashCode(); 1012 hash = (37 * hash) + CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER; 1013 hash = (53 * hash) + getCrossRealmTrustSharedPasswordUri().hashCode(); 1014 hash = (37 * hash) + KDC_DB_KEY_URI_FIELD_NUMBER; 1015 hash = (53 * hash) + getKdcDbKeyUri().hashCode(); 1016 hash = (37 * hash) + TGT_LIFETIME_HOURS_FIELD_NUMBER; 1017 hash = (53 * hash) + getTgtLifetimeHours(); 1018 hash = (37 * hash) + REALM_FIELD_NUMBER; 1019 hash = (53 * hash) + getRealm().hashCode(); 1020 hash = (29 * hash) + getUnknownFields().hashCode(); 1021 memoizedHashCode = hash; 1022 return hash; 1023 } 1024 parseFrom(java.nio.ByteBuffer data)1025 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.nio.ByteBuffer data) 1026 throws com.google.protobuf.InvalidProtocolBufferException { 1027 return PARSER.parseFrom(data); 1028 } 1029 parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1030 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1031 java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1032 throws com.google.protobuf.InvalidProtocolBufferException { 1033 return PARSER.parseFrom(data, extensionRegistry); 1034 } 1035 parseFrom( com.google.protobuf.ByteString data)1036 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1037 com.google.protobuf.ByteString data) 1038 throws com.google.protobuf.InvalidProtocolBufferException { 1039 return PARSER.parseFrom(data); 1040 } 1041 parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1042 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1043 com.google.protobuf.ByteString data, 1044 com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1045 throws com.google.protobuf.InvalidProtocolBufferException { 1046 return PARSER.parseFrom(data, extensionRegistry); 1047 } 1048 parseFrom(byte[] data)1049 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(byte[] data) 1050 throws com.google.protobuf.InvalidProtocolBufferException { 1051 return PARSER.parseFrom(data); 1052 } 1053 parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1054 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1055 byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1056 throws com.google.protobuf.InvalidProtocolBufferException { 1057 return PARSER.parseFrom(data, extensionRegistry); 1058 } 1059 parseFrom(java.io.InputStream input)1060 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.io.InputStream input) 1061 throws java.io.IOException { 1062 return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); 1063 } 1064 parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1065 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1066 java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1067 throws java.io.IOException { 1068 return com.google.protobuf.GeneratedMessageV3.parseWithIOException( 1069 PARSER, input, extensionRegistry); 1070 } 1071 parseDelimitedFrom( java.io.InputStream input)1072 public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom( 1073 java.io.InputStream input) throws java.io.IOException { 1074 return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); 1075 } 1076 parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1077 public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom( 1078 java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1079 throws java.io.IOException { 1080 return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( 1081 PARSER, input, extensionRegistry); 1082 } 1083 parseFrom( com.google.protobuf.CodedInputStream input)1084 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1085 com.google.protobuf.CodedInputStream input) throws java.io.IOException { 1086 return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); 1087 } 1088 parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1089 public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( 1090 com.google.protobuf.CodedInputStream input, 1091 com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1092 throws java.io.IOException { 1093 return com.google.protobuf.GeneratedMessageV3.parseWithIOException( 1094 PARSER, input, extensionRegistry); 1095 } 1096 1097 @java.lang.Override newBuilderForType()1098 public Builder newBuilderForType() { 1099 return newBuilder(); 1100 } 1101 newBuilder()1102 public static Builder newBuilder() { 1103 return DEFAULT_INSTANCE.toBuilder(); 1104 } 1105 newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype)1106 public static Builder newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype) { 1107 return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); 1108 } 1109 1110 @java.lang.Override toBuilder()1111 public Builder toBuilder() { 1112 return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); 1113 } 1114 1115 @java.lang.Override newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)1116 protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { 1117 Builder builder = new Builder(parent); 1118 return builder; 1119 } 1120 /** 1121 * 1122 * 1123 * <pre> 1124 * Specifies Kerberos related configuration. 1125 * </pre> 1126 * 1127 * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig} 1128 */ 1129 public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder<Builder> 1130 implements 1131 // @@protoc_insertion_point(builder_implements:google.cloud.dataproc.v1.KerberosConfig) 1132 com.google.cloud.dataproc.v1.KerberosConfigOrBuilder { getDescriptor()1133 public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { 1134 return com.google.cloud.dataproc.v1.ClustersProto 1135 .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; 1136 } 1137 1138 @java.lang.Override 1139 protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()1140 internalGetFieldAccessorTable() { 1141 return com.google.cloud.dataproc.v1.ClustersProto 1142 .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable 1143 .ensureFieldAccessorsInitialized( 1144 com.google.cloud.dataproc.v1.KerberosConfig.class, 1145 com.google.cloud.dataproc.v1.KerberosConfig.Builder.class); 1146 } 1147 1148 // Construct using com.google.cloud.dataproc.v1.KerberosConfig.newBuilder() Builder()1149 private Builder() {} 1150 Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)1151 private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { 1152 super(parent); 1153 } 1154 1155 @java.lang.Override clear()1156 public Builder clear() { 1157 super.clear(); 1158 bitField0_ = 0; 1159 enableKerberos_ = false; 1160 rootPrincipalPasswordUri_ = ""; 1161 kmsKeyUri_ = ""; 1162 keystoreUri_ = ""; 1163 truststoreUri_ = ""; 1164 keystorePasswordUri_ = ""; 1165 keyPasswordUri_ = ""; 1166 truststorePasswordUri_ = ""; 1167 crossRealmTrustRealm_ = ""; 1168 crossRealmTrustKdc_ = ""; 1169 crossRealmTrustAdminServer_ = ""; 1170 crossRealmTrustSharedPasswordUri_ = ""; 1171 kdcDbKeyUri_ = ""; 1172 tgtLifetimeHours_ = 0; 1173 realm_ = ""; 1174 return this; 1175 } 1176 1177 @java.lang.Override getDescriptorForType()1178 public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { 1179 return com.google.cloud.dataproc.v1.ClustersProto 1180 .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; 1181 } 1182 1183 @java.lang.Override getDefaultInstanceForType()1184 public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() { 1185 return com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance(); 1186 } 1187 1188 @java.lang.Override build()1189 public com.google.cloud.dataproc.v1.KerberosConfig build() { 1190 com.google.cloud.dataproc.v1.KerberosConfig result = buildPartial(); 1191 if (!result.isInitialized()) { 1192 throw newUninitializedMessageException(result); 1193 } 1194 return result; 1195 } 1196 1197 @java.lang.Override buildPartial()1198 public com.google.cloud.dataproc.v1.KerberosConfig buildPartial() { 1199 com.google.cloud.dataproc.v1.KerberosConfig result = 1200 new com.google.cloud.dataproc.v1.KerberosConfig(this); 1201 if (bitField0_ != 0) { 1202 buildPartial0(result); 1203 } 1204 onBuilt(); 1205 return result; 1206 } 1207 buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result)1208 private void buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result) { 1209 int from_bitField0_ = bitField0_; 1210 if (((from_bitField0_ & 0x00000001) != 0)) { 1211 result.enableKerberos_ = enableKerberos_; 1212 } 1213 if (((from_bitField0_ & 0x00000002) != 0)) { 1214 result.rootPrincipalPasswordUri_ = rootPrincipalPasswordUri_; 1215 } 1216 if (((from_bitField0_ & 0x00000004) != 0)) { 1217 result.kmsKeyUri_ = kmsKeyUri_; 1218 } 1219 if (((from_bitField0_ & 0x00000008) != 0)) { 1220 result.keystoreUri_ = keystoreUri_; 1221 } 1222 if (((from_bitField0_ & 0x00000010) != 0)) { 1223 result.truststoreUri_ = truststoreUri_; 1224 } 1225 if (((from_bitField0_ & 0x00000020) != 0)) { 1226 result.keystorePasswordUri_ = keystorePasswordUri_; 1227 } 1228 if (((from_bitField0_ & 0x00000040) != 0)) { 1229 result.keyPasswordUri_ = keyPasswordUri_; 1230 } 1231 if (((from_bitField0_ & 0x00000080) != 0)) { 1232 result.truststorePasswordUri_ = truststorePasswordUri_; 1233 } 1234 if (((from_bitField0_ & 0x00000100) != 0)) { 1235 result.crossRealmTrustRealm_ = crossRealmTrustRealm_; 1236 } 1237 if (((from_bitField0_ & 0x00000200) != 0)) { 1238 result.crossRealmTrustKdc_ = crossRealmTrustKdc_; 1239 } 1240 if (((from_bitField0_ & 0x00000400) != 0)) { 1241 result.crossRealmTrustAdminServer_ = crossRealmTrustAdminServer_; 1242 } 1243 if (((from_bitField0_ & 0x00000800) != 0)) { 1244 result.crossRealmTrustSharedPasswordUri_ = crossRealmTrustSharedPasswordUri_; 1245 } 1246 if (((from_bitField0_ & 0x00001000) != 0)) { 1247 result.kdcDbKeyUri_ = kdcDbKeyUri_; 1248 } 1249 if (((from_bitField0_ & 0x00002000) != 0)) { 1250 result.tgtLifetimeHours_ = tgtLifetimeHours_; 1251 } 1252 if (((from_bitField0_ & 0x00004000) != 0)) { 1253 result.realm_ = realm_; 1254 } 1255 } 1256 1257 @java.lang.Override clone()1258 public Builder clone() { 1259 return super.clone(); 1260 } 1261 1262 @java.lang.Override setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value)1263 public Builder setField( 1264 com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { 1265 return super.setField(field, value); 1266 } 1267 1268 @java.lang.Override clearField(com.google.protobuf.Descriptors.FieldDescriptor field)1269 public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { 1270 return super.clearField(field); 1271 } 1272 1273 @java.lang.Override clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)1274 public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { 1275 return super.clearOneof(oneof); 1276 } 1277 1278 @java.lang.Override setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value)1279 public Builder setRepeatedField( 1280 com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { 1281 return super.setRepeatedField(field, index, value); 1282 } 1283 1284 @java.lang.Override addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value)1285 public Builder addRepeatedField( 1286 com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { 1287 return super.addRepeatedField(field, value); 1288 } 1289 1290 @java.lang.Override mergeFrom(com.google.protobuf.Message other)1291 public Builder mergeFrom(com.google.protobuf.Message other) { 1292 if (other instanceof com.google.cloud.dataproc.v1.KerberosConfig) { 1293 return mergeFrom((com.google.cloud.dataproc.v1.KerberosConfig) other); 1294 } else { 1295 super.mergeFrom(other); 1296 return this; 1297 } 1298 } 1299 mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other)1300 public Builder mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other) { 1301 if (other == com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance()) return this; 1302 if (other.getEnableKerberos() != false) { 1303 setEnableKerberos(other.getEnableKerberos()); 1304 } 1305 if (!other.getRootPrincipalPasswordUri().isEmpty()) { 1306 rootPrincipalPasswordUri_ = other.rootPrincipalPasswordUri_; 1307 bitField0_ |= 0x00000002; 1308 onChanged(); 1309 } 1310 if (!other.getKmsKeyUri().isEmpty()) { 1311 kmsKeyUri_ = other.kmsKeyUri_; 1312 bitField0_ |= 0x00000004; 1313 onChanged(); 1314 } 1315 if (!other.getKeystoreUri().isEmpty()) { 1316 keystoreUri_ = other.keystoreUri_; 1317 bitField0_ |= 0x00000008; 1318 onChanged(); 1319 } 1320 if (!other.getTruststoreUri().isEmpty()) { 1321 truststoreUri_ = other.truststoreUri_; 1322 bitField0_ |= 0x00000010; 1323 onChanged(); 1324 } 1325 if (!other.getKeystorePasswordUri().isEmpty()) { 1326 keystorePasswordUri_ = other.keystorePasswordUri_; 1327 bitField0_ |= 0x00000020; 1328 onChanged(); 1329 } 1330 if (!other.getKeyPasswordUri().isEmpty()) { 1331 keyPasswordUri_ = other.keyPasswordUri_; 1332 bitField0_ |= 0x00000040; 1333 onChanged(); 1334 } 1335 if (!other.getTruststorePasswordUri().isEmpty()) { 1336 truststorePasswordUri_ = other.truststorePasswordUri_; 1337 bitField0_ |= 0x00000080; 1338 onChanged(); 1339 } 1340 if (!other.getCrossRealmTrustRealm().isEmpty()) { 1341 crossRealmTrustRealm_ = other.crossRealmTrustRealm_; 1342 bitField0_ |= 0x00000100; 1343 onChanged(); 1344 } 1345 if (!other.getCrossRealmTrustKdc().isEmpty()) { 1346 crossRealmTrustKdc_ = other.crossRealmTrustKdc_; 1347 bitField0_ |= 0x00000200; 1348 onChanged(); 1349 } 1350 if (!other.getCrossRealmTrustAdminServer().isEmpty()) { 1351 crossRealmTrustAdminServer_ = other.crossRealmTrustAdminServer_; 1352 bitField0_ |= 0x00000400; 1353 onChanged(); 1354 } 1355 if (!other.getCrossRealmTrustSharedPasswordUri().isEmpty()) { 1356 crossRealmTrustSharedPasswordUri_ = other.crossRealmTrustSharedPasswordUri_; 1357 bitField0_ |= 0x00000800; 1358 onChanged(); 1359 } 1360 if (!other.getKdcDbKeyUri().isEmpty()) { 1361 kdcDbKeyUri_ = other.kdcDbKeyUri_; 1362 bitField0_ |= 0x00001000; 1363 onChanged(); 1364 } 1365 if (other.getTgtLifetimeHours() != 0) { 1366 setTgtLifetimeHours(other.getTgtLifetimeHours()); 1367 } 1368 if (!other.getRealm().isEmpty()) { 1369 realm_ = other.realm_; 1370 bitField0_ |= 0x00004000; 1371 onChanged(); 1372 } 1373 this.mergeUnknownFields(other.getUnknownFields()); 1374 onChanged(); 1375 return this; 1376 } 1377 1378 @java.lang.Override isInitialized()1379 public final boolean isInitialized() { 1380 return true; 1381 } 1382 1383 @java.lang.Override mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)1384 public Builder mergeFrom( 1385 com.google.protobuf.CodedInputStream input, 1386 com.google.protobuf.ExtensionRegistryLite extensionRegistry) 1387 throws java.io.IOException { 1388 if (extensionRegistry == null) { 1389 throw new java.lang.NullPointerException(); 1390 } 1391 try { 1392 boolean done = false; 1393 while (!done) { 1394 int tag = input.readTag(); 1395 switch (tag) { 1396 case 0: 1397 done = true; 1398 break; 1399 case 8: 1400 { 1401 enableKerberos_ = input.readBool(); 1402 bitField0_ |= 0x00000001; 1403 break; 1404 } // case 8 1405 case 18: 1406 { 1407 rootPrincipalPasswordUri_ = input.readStringRequireUtf8(); 1408 bitField0_ |= 0x00000002; 1409 break; 1410 } // case 18 1411 case 26: 1412 { 1413 kmsKeyUri_ = input.readStringRequireUtf8(); 1414 bitField0_ |= 0x00000004; 1415 break; 1416 } // case 26 1417 case 34: 1418 { 1419 keystoreUri_ = input.readStringRequireUtf8(); 1420 bitField0_ |= 0x00000008; 1421 break; 1422 } // case 34 1423 case 42: 1424 { 1425 truststoreUri_ = input.readStringRequireUtf8(); 1426 bitField0_ |= 0x00000010; 1427 break; 1428 } // case 42 1429 case 50: 1430 { 1431 keystorePasswordUri_ = input.readStringRequireUtf8(); 1432 bitField0_ |= 0x00000020; 1433 break; 1434 } // case 50 1435 case 58: 1436 { 1437 keyPasswordUri_ = input.readStringRequireUtf8(); 1438 bitField0_ |= 0x00000040; 1439 break; 1440 } // case 58 1441 case 66: 1442 { 1443 truststorePasswordUri_ = input.readStringRequireUtf8(); 1444 bitField0_ |= 0x00000080; 1445 break; 1446 } // case 66 1447 case 74: 1448 { 1449 crossRealmTrustRealm_ = input.readStringRequireUtf8(); 1450 bitField0_ |= 0x00000100; 1451 break; 1452 } // case 74 1453 case 82: 1454 { 1455 crossRealmTrustKdc_ = input.readStringRequireUtf8(); 1456 bitField0_ |= 0x00000200; 1457 break; 1458 } // case 82 1459 case 90: 1460 { 1461 crossRealmTrustAdminServer_ = input.readStringRequireUtf8(); 1462 bitField0_ |= 0x00000400; 1463 break; 1464 } // case 90 1465 case 98: 1466 { 1467 crossRealmTrustSharedPasswordUri_ = input.readStringRequireUtf8(); 1468 bitField0_ |= 0x00000800; 1469 break; 1470 } // case 98 1471 case 106: 1472 { 1473 kdcDbKeyUri_ = input.readStringRequireUtf8(); 1474 bitField0_ |= 0x00001000; 1475 break; 1476 } // case 106 1477 case 112: 1478 { 1479 tgtLifetimeHours_ = input.readInt32(); 1480 bitField0_ |= 0x00002000; 1481 break; 1482 } // case 112 1483 case 122: 1484 { 1485 realm_ = input.readStringRequireUtf8(); 1486 bitField0_ |= 0x00004000; 1487 break; 1488 } // case 122 1489 default: 1490 { 1491 if (!super.parseUnknownField(input, extensionRegistry, tag)) { 1492 done = true; // was an endgroup tag 1493 } 1494 break; 1495 } // default: 1496 } // switch (tag) 1497 } // while (!done) 1498 } catch (com.google.protobuf.InvalidProtocolBufferException e) { 1499 throw e.unwrapIOException(); 1500 } finally { 1501 onChanged(); 1502 } // finally 1503 return this; 1504 } 1505 1506 private int bitField0_; 1507 1508 private boolean enableKerberos_; 1509 /** 1510 * 1511 * 1512 * <pre> 1513 * Optional. Flag to indicate whether to Kerberize the cluster (default: 1514 * false). Set this field to true to enable Kerberos on a cluster. 1515 * </pre> 1516 * 1517 * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code> 1518 * 1519 * @return The enableKerberos. 1520 */ 1521 @java.lang.Override getEnableKerberos()1522 public boolean getEnableKerberos() { 1523 return enableKerberos_; 1524 } 1525 /** 1526 * 1527 * 1528 * <pre> 1529 * Optional. Flag to indicate whether to Kerberize the cluster (default: 1530 * false). Set this field to true to enable Kerberos on a cluster. 1531 * </pre> 1532 * 1533 * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code> 1534 * 1535 * @param value The enableKerberos to set. 1536 * @return This builder for chaining. 1537 */ setEnableKerberos(boolean value)1538 public Builder setEnableKerberos(boolean value) { 1539 1540 enableKerberos_ = value; 1541 bitField0_ |= 0x00000001; 1542 onChanged(); 1543 return this; 1544 } 1545 /** 1546 * 1547 * 1548 * <pre> 1549 * Optional. Flag to indicate whether to Kerberize the cluster (default: 1550 * false). Set this field to true to enable Kerberos on a cluster. 1551 * </pre> 1552 * 1553 * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code> 1554 * 1555 * @return This builder for chaining. 1556 */ clearEnableKerberos()1557 public Builder clearEnableKerberos() { 1558 bitField0_ = (bitField0_ & ~0x00000001); 1559 enableKerberos_ = false; 1560 onChanged(); 1561 return this; 1562 } 1563 1564 private java.lang.Object rootPrincipalPasswordUri_ = ""; 1565 /** 1566 * 1567 * 1568 * <pre> 1569 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 1570 * principal password. 1571 * </pre> 1572 * 1573 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL]; 1574 * </code> 1575 * 1576 * @return The rootPrincipalPasswordUri. 1577 */ getRootPrincipalPasswordUri()1578 public java.lang.String getRootPrincipalPasswordUri() { 1579 java.lang.Object ref = rootPrincipalPasswordUri_; 1580 if (!(ref instanceof java.lang.String)) { 1581 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 1582 java.lang.String s = bs.toStringUtf8(); 1583 rootPrincipalPasswordUri_ = s; 1584 return s; 1585 } else { 1586 return (java.lang.String) ref; 1587 } 1588 } 1589 /** 1590 * 1591 * 1592 * <pre> 1593 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 1594 * principal password. 1595 * </pre> 1596 * 1597 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL]; 1598 * </code> 1599 * 1600 * @return The bytes for rootPrincipalPasswordUri. 1601 */ getRootPrincipalPasswordUriBytes()1602 public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() { 1603 java.lang.Object ref = rootPrincipalPasswordUri_; 1604 if (ref instanceof String) { 1605 com.google.protobuf.ByteString b = 1606 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 1607 rootPrincipalPasswordUri_ = b; 1608 return b; 1609 } else { 1610 return (com.google.protobuf.ByteString) ref; 1611 } 1612 } 1613 /** 1614 * 1615 * 1616 * <pre> 1617 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 1618 * principal password. 1619 * </pre> 1620 * 1621 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL]; 1622 * </code> 1623 * 1624 * @param value The rootPrincipalPasswordUri to set. 1625 * @return This builder for chaining. 1626 */ setRootPrincipalPasswordUri(java.lang.String value)1627 public Builder setRootPrincipalPasswordUri(java.lang.String value) { 1628 if (value == null) { 1629 throw new NullPointerException(); 1630 } 1631 rootPrincipalPasswordUri_ = value; 1632 bitField0_ |= 0x00000002; 1633 onChanged(); 1634 return this; 1635 } 1636 /** 1637 * 1638 * 1639 * <pre> 1640 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 1641 * principal password. 1642 * </pre> 1643 * 1644 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL]; 1645 * </code> 1646 * 1647 * @return This builder for chaining. 1648 */ clearRootPrincipalPasswordUri()1649 public Builder clearRootPrincipalPasswordUri() { 1650 rootPrincipalPasswordUri_ = getDefaultInstance().getRootPrincipalPasswordUri(); 1651 bitField0_ = (bitField0_ & ~0x00000002); 1652 onChanged(); 1653 return this; 1654 } 1655 /** 1656 * 1657 * 1658 * <pre> 1659 * Optional. The Cloud Storage URI of a KMS encrypted file containing the root 1660 * principal password. 1661 * </pre> 1662 * 1663 * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL]; 1664 * </code> 1665 * 1666 * @param value The bytes for rootPrincipalPasswordUri to set. 1667 * @return This builder for chaining. 1668 */ setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value)1669 public Builder setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value) { 1670 if (value == null) { 1671 throw new NullPointerException(); 1672 } 1673 checkByteStringIsUtf8(value); 1674 rootPrincipalPasswordUri_ = value; 1675 bitField0_ |= 0x00000002; 1676 onChanged(); 1677 return this; 1678 } 1679 1680 private java.lang.Object kmsKeyUri_ = ""; 1681 /** 1682 * 1683 * 1684 * <pre> 1685 * Optional. The uri of the KMS key used to encrypt various sensitive 1686 * files. 1687 * </pre> 1688 * 1689 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 1690 * 1691 * @return The kmsKeyUri. 1692 */ getKmsKeyUri()1693 public java.lang.String getKmsKeyUri() { 1694 java.lang.Object ref = kmsKeyUri_; 1695 if (!(ref instanceof java.lang.String)) { 1696 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 1697 java.lang.String s = bs.toStringUtf8(); 1698 kmsKeyUri_ = s; 1699 return s; 1700 } else { 1701 return (java.lang.String) ref; 1702 } 1703 } 1704 /** 1705 * 1706 * 1707 * <pre> 1708 * Optional. The uri of the KMS key used to encrypt various sensitive 1709 * files. 1710 * </pre> 1711 * 1712 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 1713 * 1714 * @return The bytes for kmsKeyUri. 1715 */ getKmsKeyUriBytes()1716 public com.google.protobuf.ByteString getKmsKeyUriBytes() { 1717 java.lang.Object ref = kmsKeyUri_; 1718 if (ref instanceof String) { 1719 com.google.protobuf.ByteString b = 1720 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 1721 kmsKeyUri_ = b; 1722 return b; 1723 } else { 1724 return (com.google.protobuf.ByteString) ref; 1725 } 1726 } 1727 /** 1728 * 1729 * 1730 * <pre> 1731 * Optional. The uri of the KMS key used to encrypt various sensitive 1732 * files. 1733 * </pre> 1734 * 1735 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 1736 * 1737 * @param value The kmsKeyUri to set. 1738 * @return This builder for chaining. 1739 */ setKmsKeyUri(java.lang.String value)1740 public Builder setKmsKeyUri(java.lang.String value) { 1741 if (value == null) { 1742 throw new NullPointerException(); 1743 } 1744 kmsKeyUri_ = value; 1745 bitField0_ |= 0x00000004; 1746 onChanged(); 1747 return this; 1748 } 1749 /** 1750 * 1751 * 1752 * <pre> 1753 * Optional. The uri of the KMS key used to encrypt various sensitive 1754 * files. 1755 * </pre> 1756 * 1757 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 1758 * 1759 * @return This builder for chaining. 1760 */ clearKmsKeyUri()1761 public Builder clearKmsKeyUri() { 1762 kmsKeyUri_ = getDefaultInstance().getKmsKeyUri(); 1763 bitField0_ = (bitField0_ & ~0x00000004); 1764 onChanged(); 1765 return this; 1766 } 1767 /** 1768 * 1769 * 1770 * <pre> 1771 * Optional. The uri of the KMS key used to encrypt various sensitive 1772 * files. 1773 * </pre> 1774 * 1775 * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code> 1776 * 1777 * @param value The bytes for kmsKeyUri to set. 1778 * @return This builder for chaining. 1779 */ setKmsKeyUriBytes(com.google.protobuf.ByteString value)1780 public Builder setKmsKeyUriBytes(com.google.protobuf.ByteString value) { 1781 if (value == null) { 1782 throw new NullPointerException(); 1783 } 1784 checkByteStringIsUtf8(value); 1785 kmsKeyUri_ = value; 1786 bitField0_ |= 0x00000004; 1787 onChanged(); 1788 return this; 1789 } 1790 1791 private java.lang.Object keystoreUri_ = ""; 1792 /** 1793 * 1794 * 1795 * <pre> 1796 * Optional. The Cloud Storage URI of the keystore file used for SSL 1797 * encryption. If not provided, Dataproc will provide a self-signed 1798 * certificate. 1799 * </pre> 1800 * 1801 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 1802 * 1803 * @return The keystoreUri. 1804 */ getKeystoreUri()1805 public java.lang.String getKeystoreUri() { 1806 java.lang.Object ref = keystoreUri_; 1807 if (!(ref instanceof java.lang.String)) { 1808 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 1809 java.lang.String s = bs.toStringUtf8(); 1810 keystoreUri_ = s; 1811 return s; 1812 } else { 1813 return (java.lang.String) ref; 1814 } 1815 } 1816 /** 1817 * 1818 * 1819 * <pre> 1820 * Optional. The Cloud Storage URI of the keystore file used for SSL 1821 * encryption. If not provided, Dataproc will provide a self-signed 1822 * certificate. 1823 * </pre> 1824 * 1825 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 1826 * 1827 * @return The bytes for keystoreUri. 1828 */ getKeystoreUriBytes()1829 public com.google.protobuf.ByteString getKeystoreUriBytes() { 1830 java.lang.Object ref = keystoreUri_; 1831 if (ref instanceof String) { 1832 com.google.protobuf.ByteString b = 1833 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 1834 keystoreUri_ = b; 1835 return b; 1836 } else { 1837 return (com.google.protobuf.ByteString) ref; 1838 } 1839 } 1840 /** 1841 * 1842 * 1843 * <pre> 1844 * Optional. The Cloud Storage URI of the keystore file used for SSL 1845 * encryption. If not provided, Dataproc will provide a self-signed 1846 * certificate. 1847 * </pre> 1848 * 1849 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 1850 * 1851 * @param value The keystoreUri to set. 1852 * @return This builder for chaining. 1853 */ setKeystoreUri(java.lang.String value)1854 public Builder setKeystoreUri(java.lang.String value) { 1855 if (value == null) { 1856 throw new NullPointerException(); 1857 } 1858 keystoreUri_ = value; 1859 bitField0_ |= 0x00000008; 1860 onChanged(); 1861 return this; 1862 } 1863 /** 1864 * 1865 * 1866 * <pre> 1867 * Optional. The Cloud Storage URI of the keystore file used for SSL 1868 * encryption. If not provided, Dataproc will provide a self-signed 1869 * certificate. 1870 * </pre> 1871 * 1872 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 1873 * 1874 * @return This builder for chaining. 1875 */ clearKeystoreUri()1876 public Builder clearKeystoreUri() { 1877 keystoreUri_ = getDefaultInstance().getKeystoreUri(); 1878 bitField0_ = (bitField0_ & ~0x00000008); 1879 onChanged(); 1880 return this; 1881 } 1882 /** 1883 * 1884 * 1885 * <pre> 1886 * Optional. The Cloud Storage URI of the keystore file used for SSL 1887 * encryption. If not provided, Dataproc will provide a self-signed 1888 * certificate. 1889 * </pre> 1890 * 1891 * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code> 1892 * 1893 * @param value The bytes for keystoreUri to set. 1894 * @return This builder for chaining. 1895 */ setKeystoreUriBytes(com.google.protobuf.ByteString value)1896 public Builder setKeystoreUriBytes(com.google.protobuf.ByteString value) { 1897 if (value == null) { 1898 throw new NullPointerException(); 1899 } 1900 checkByteStringIsUtf8(value); 1901 keystoreUri_ = value; 1902 bitField0_ |= 0x00000008; 1903 onChanged(); 1904 return this; 1905 } 1906 1907 private java.lang.Object truststoreUri_ = ""; 1908 /** 1909 * 1910 * 1911 * <pre> 1912 * Optional. The Cloud Storage URI of the truststore file used for SSL 1913 * encryption. If not provided, Dataproc will provide a self-signed 1914 * certificate. 1915 * </pre> 1916 * 1917 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 1918 * 1919 * @return The truststoreUri. 1920 */ getTruststoreUri()1921 public java.lang.String getTruststoreUri() { 1922 java.lang.Object ref = truststoreUri_; 1923 if (!(ref instanceof java.lang.String)) { 1924 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 1925 java.lang.String s = bs.toStringUtf8(); 1926 truststoreUri_ = s; 1927 return s; 1928 } else { 1929 return (java.lang.String) ref; 1930 } 1931 } 1932 /** 1933 * 1934 * 1935 * <pre> 1936 * Optional. The Cloud Storage URI of the truststore file used for SSL 1937 * encryption. If not provided, Dataproc will provide a self-signed 1938 * certificate. 1939 * </pre> 1940 * 1941 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 1942 * 1943 * @return The bytes for truststoreUri. 1944 */ getTruststoreUriBytes()1945 public com.google.protobuf.ByteString getTruststoreUriBytes() { 1946 java.lang.Object ref = truststoreUri_; 1947 if (ref instanceof String) { 1948 com.google.protobuf.ByteString b = 1949 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 1950 truststoreUri_ = b; 1951 return b; 1952 } else { 1953 return (com.google.protobuf.ByteString) ref; 1954 } 1955 } 1956 /** 1957 * 1958 * 1959 * <pre> 1960 * Optional. The Cloud Storage URI of the truststore file used for SSL 1961 * encryption. If not provided, Dataproc will provide a self-signed 1962 * certificate. 1963 * </pre> 1964 * 1965 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 1966 * 1967 * @param value The truststoreUri to set. 1968 * @return This builder for chaining. 1969 */ setTruststoreUri(java.lang.String value)1970 public Builder setTruststoreUri(java.lang.String value) { 1971 if (value == null) { 1972 throw new NullPointerException(); 1973 } 1974 truststoreUri_ = value; 1975 bitField0_ |= 0x00000010; 1976 onChanged(); 1977 return this; 1978 } 1979 /** 1980 * 1981 * 1982 * <pre> 1983 * Optional. The Cloud Storage URI of the truststore file used for SSL 1984 * encryption. If not provided, Dataproc will provide a self-signed 1985 * certificate. 1986 * </pre> 1987 * 1988 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 1989 * 1990 * @return This builder for chaining. 1991 */ clearTruststoreUri()1992 public Builder clearTruststoreUri() { 1993 truststoreUri_ = getDefaultInstance().getTruststoreUri(); 1994 bitField0_ = (bitField0_ & ~0x00000010); 1995 onChanged(); 1996 return this; 1997 } 1998 /** 1999 * 2000 * 2001 * <pre> 2002 * Optional. The Cloud Storage URI of the truststore file used for SSL 2003 * encryption. If not provided, Dataproc will provide a self-signed 2004 * certificate. 2005 * </pre> 2006 * 2007 * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code> 2008 * 2009 * @param value The bytes for truststoreUri to set. 2010 * @return This builder for chaining. 2011 */ setTruststoreUriBytes(com.google.protobuf.ByteString value)2012 public Builder setTruststoreUriBytes(com.google.protobuf.ByteString value) { 2013 if (value == null) { 2014 throw new NullPointerException(); 2015 } 2016 checkByteStringIsUtf8(value); 2017 truststoreUri_ = value; 2018 bitField0_ |= 0x00000010; 2019 onChanged(); 2020 return this; 2021 } 2022 2023 private java.lang.Object keystorePasswordUri_ = ""; 2024 /** 2025 * 2026 * 2027 * <pre> 2028 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2029 * password to the user provided keystore. For the self-signed certificate, 2030 * this password is generated by Dataproc. 2031 * </pre> 2032 * 2033 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 2034 * 2035 * @return The keystorePasswordUri. 2036 */ getKeystorePasswordUri()2037 public java.lang.String getKeystorePasswordUri() { 2038 java.lang.Object ref = keystorePasswordUri_; 2039 if (!(ref instanceof java.lang.String)) { 2040 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2041 java.lang.String s = bs.toStringUtf8(); 2042 keystorePasswordUri_ = s; 2043 return s; 2044 } else { 2045 return (java.lang.String) ref; 2046 } 2047 } 2048 /** 2049 * 2050 * 2051 * <pre> 2052 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2053 * password to the user provided keystore. For the self-signed certificate, 2054 * this password is generated by Dataproc. 2055 * </pre> 2056 * 2057 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 2058 * 2059 * @return The bytes for keystorePasswordUri. 2060 */ getKeystorePasswordUriBytes()2061 public com.google.protobuf.ByteString getKeystorePasswordUriBytes() { 2062 java.lang.Object ref = keystorePasswordUri_; 2063 if (ref instanceof String) { 2064 com.google.protobuf.ByteString b = 2065 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2066 keystorePasswordUri_ = b; 2067 return b; 2068 } else { 2069 return (com.google.protobuf.ByteString) ref; 2070 } 2071 } 2072 /** 2073 * 2074 * 2075 * <pre> 2076 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2077 * password to the user provided keystore. For the self-signed certificate, 2078 * this password is generated by Dataproc. 2079 * </pre> 2080 * 2081 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 2082 * 2083 * @param value The keystorePasswordUri to set. 2084 * @return This builder for chaining. 2085 */ setKeystorePasswordUri(java.lang.String value)2086 public Builder setKeystorePasswordUri(java.lang.String value) { 2087 if (value == null) { 2088 throw new NullPointerException(); 2089 } 2090 keystorePasswordUri_ = value; 2091 bitField0_ |= 0x00000020; 2092 onChanged(); 2093 return this; 2094 } 2095 /** 2096 * 2097 * 2098 * <pre> 2099 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2100 * password to the user provided keystore. For the self-signed certificate, 2101 * this password is generated by Dataproc. 2102 * </pre> 2103 * 2104 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 2105 * 2106 * @return This builder for chaining. 2107 */ clearKeystorePasswordUri()2108 public Builder clearKeystorePasswordUri() { 2109 keystorePasswordUri_ = getDefaultInstance().getKeystorePasswordUri(); 2110 bitField0_ = (bitField0_ & ~0x00000020); 2111 onChanged(); 2112 return this; 2113 } 2114 /** 2115 * 2116 * 2117 * <pre> 2118 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2119 * password to the user provided keystore. For the self-signed certificate, 2120 * this password is generated by Dataproc. 2121 * </pre> 2122 * 2123 * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code> 2124 * 2125 * @param value The bytes for keystorePasswordUri to set. 2126 * @return This builder for chaining. 2127 */ setKeystorePasswordUriBytes(com.google.protobuf.ByteString value)2128 public Builder setKeystorePasswordUriBytes(com.google.protobuf.ByteString value) { 2129 if (value == null) { 2130 throw new NullPointerException(); 2131 } 2132 checkByteStringIsUtf8(value); 2133 keystorePasswordUri_ = value; 2134 bitField0_ |= 0x00000020; 2135 onChanged(); 2136 return this; 2137 } 2138 2139 private java.lang.Object keyPasswordUri_ = ""; 2140 /** 2141 * 2142 * 2143 * <pre> 2144 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2145 * password to the user provided key. For the self-signed certificate, this 2146 * password is generated by Dataproc. 2147 * </pre> 2148 * 2149 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 2150 * 2151 * @return The keyPasswordUri. 2152 */ getKeyPasswordUri()2153 public java.lang.String getKeyPasswordUri() { 2154 java.lang.Object ref = keyPasswordUri_; 2155 if (!(ref instanceof java.lang.String)) { 2156 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2157 java.lang.String s = bs.toStringUtf8(); 2158 keyPasswordUri_ = s; 2159 return s; 2160 } else { 2161 return (java.lang.String) ref; 2162 } 2163 } 2164 /** 2165 * 2166 * 2167 * <pre> 2168 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2169 * password to the user provided key. For the self-signed certificate, this 2170 * password is generated by Dataproc. 2171 * </pre> 2172 * 2173 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 2174 * 2175 * @return The bytes for keyPasswordUri. 2176 */ getKeyPasswordUriBytes()2177 public com.google.protobuf.ByteString getKeyPasswordUriBytes() { 2178 java.lang.Object ref = keyPasswordUri_; 2179 if (ref instanceof String) { 2180 com.google.protobuf.ByteString b = 2181 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2182 keyPasswordUri_ = b; 2183 return b; 2184 } else { 2185 return (com.google.protobuf.ByteString) ref; 2186 } 2187 } 2188 /** 2189 * 2190 * 2191 * <pre> 2192 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2193 * password to the user provided key. For the self-signed certificate, this 2194 * password is generated by Dataproc. 2195 * </pre> 2196 * 2197 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 2198 * 2199 * @param value The keyPasswordUri to set. 2200 * @return This builder for chaining. 2201 */ setKeyPasswordUri(java.lang.String value)2202 public Builder setKeyPasswordUri(java.lang.String value) { 2203 if (value == null) { 2204 throw new NullPointerException(); 2205 } 2206 keyPasswordUri_ = value; 2207 bitField0_ |= 0x00000040; 2208 onChanged(); 2209 return this; 2210 } 2211 /** 2212 * 2213 * 2214 * <pre> 2215 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2216 * password to the user provided key. For the self-signed certificate, this 2217 * password is generated by Dataproc. 2218 * </pre> 2219 * 2220 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 2221 * 2222 * @return This builder for chaining. 2223 */ clearKeyPasswordUri()2224 public Builder clearKeyPasswordUri() { 2225 keyPasswordUri_ = getDefaultInstance().getKeyPasswordUri(); 2226 bitField0_ = (bitField0_ & ~0x00000040); 2227 onChanged(); 2228 return this; 2229 } 2230 /** 2231 * 2232 * 2233 * <pre> 2234 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2235 * password to the user provided key. For the self-signed certificate, this 2236 * password is generated by Dataproc. 2237 * </pre> 2238 * 2239 * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code> 2240 * 2241 * @param value The bytes for keyPasswordUri to set. 2242 * @return This builder for chaining. 2243 */ setKeyPasswordUriBytes(com.google.protobuf.ByteString value)2244 public Builder setKeyPasswordUriBytes(com.google.protobuf.ByteString value) { 2245 if (value == null) { 2246 throw new NullPointerException(); 2247 } 2248 checkByteStringIsUtf8(value); 2249 keyPasswordUri_ = value; 2250 bitField0_ |= 0x00000040; 2251 onChanged(); 2252 return this; 2253 } 2254 2255 private java.lang.Object truststorePasswordUri_ = ""; 2256 /** 2257 * 2258 * 2259 * <pre> 2260 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2261 * password to the user provided truststore. For the self-signed certificate, 2262 * this password is generated by Dataproc. 2263 * </pre> 2264 * 2265 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 2266 * 2267 * @return The truststorePasswordUri. 2268 */ getTruststorePasswordUri()2269 public java.lang.String getTruststorePasswordUri() { 2270 java.lang.Object ref = truststorePasswordUri_; 2271 if (!(ref instanceof java.lang.String)) { 2272 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2273 java.lang.String s = bs.toStringUtf8(); 2274 truststorePasswordUri_ = s; 2275 return s; 2276 } else { 2277 return (java.lang.String) ref; 2278 } 2279 } 2280 /** 2281 * 2282 * 2283 * <pre> 2284 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2285 * password to the user provided truststore. For the self-signed certificate, 2286 * this password is generated by Dataproc. 2287 * </pre> 2288 * 2289 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 2290 * 2291 * @return The bytes for truststorePasswordUri. 2292 */ getTruststorePasswordUriBytes()2293 public com.google.protobuf.ByteString getTruststorePasswordUriBytes() { 2294 java.lang.Object ref = truststorePasswordUri_; 2295 if (ref instanceof String) { 2296 com.google.protobuf.ByteString b = 2297 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2298 truststorePasswordUri_ = b; 2299 return b; 2300 } else { 2301 return (com.google.protobuf.ByteString) ref; 2302 } 2303 } 2304 /** 2305 * 2306 * 2307 * <pre> 2308 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2309 * password to the user provided truststore. For the self-signed certificate, 2310 * this password is generated by Dataproc. 2311 * </pre> 2312 * 2313 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 2314 * 2315 * @param value The truststorePasswordUri to set. 2316 * @return This builder for chaining. 2317 */ setTruststorePasswordUri(java.lang.String value)2318 public Builder setTruststorePasswordUri(java.lang.String value) { 2319 if (value == null) { 2320 throw new NullPointerException(); 2321 } 2322 truststorePasswordUri_ = value; 2323 bitField0_ |= 0x00000080; 2324 onChanged(); 2325 return this; 2326 } 2327 /** 2328 * 2329 * 2330 * <pre> 2331 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2332 * password to the user provided truststore. For the self-signed certificate, 2333 * this password is generated by Dataproc. 2334 * </pre> 2335 * 2336 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 2337 * 2338 * @return This builder for chaining. 2339 */ clearTruststorePasswordUri()2340 public Builder clearTruststorePasswordUri() { 2341 truststorePasswordUri_ = getDefaultInstance().getTruststorePasswordUri(); 2342 bitField0_ = (bitField0_ & ~0x00000080); 2343 onChanged(); 2344 return this; 2345 } 2346 /** 2347 * 2348 * 2349 * <pre> 2350 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2351 * password to the user provided truststore. For the self-signed certificate, 2352 * this password is generated by Dataproc. 2353 * </pre> 2354 * 2355 * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code> 2356 * 2357 * @param value The bytes for truststorePasswordUri to set. 2358 * @return This builder for chaining. 2359 */ setTruststorePasswordUriBytes(com.google.protobuf.ByteString value)2360 public Builder setTruststorePasswordUriBytes(com.google.protobuf.ByteString value) { 2361 if (value == null) { 2362 throw new NullPointerException(); 2363 } 2364 checkByteStringIsUtf8(value); 2365 truststorePasswordUri_ = value; 2366 bitField0_ |= 0x00000080; 2367 onChanged(); 2368 return this; 2369 } 2370 2371 private java.lang.Object crossRealmTrustRealm_ = ""; 2372 /** 2373 * 2374 * 2375 * <pre> 2376 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 2377 * the user enable cross realm trust. 2378 * </pre> 2379 * 2380 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 2381 * 2382 * @return The crossRealmTrustRealm. 2383 */ getCrossRealmTrustRealm()2384 public java.lang.String getCrossRealmTrustRealm() { 2385 java.lang.Object ref = crossRealmTrustRealm_; 2386 if (!(ref instanceof java.lang.String)) { 2387 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2388 java.lang.String s = bs.toStringUtf8(); 2389 crossRealmTrustRealm_ = s; 2390 return s; 2391 } else { 2392 return (java.lang.String) ref; 2393 } 2394 } 2395 /** 2396 * 2397 * 2398 * <pre> 2399 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 2400 * the user enable cross realm trust. 2401 * </pre> 2402 * 2403 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 2404 * 2405 * @return The bytes for crossRealmTrustRealm. 2406 */ getCrossRealmTrustRealmBytes()2407 public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() { 2408 java.lang.Object ref = crossRealmTrustRealm_; 2409 if (ref instanceof String) { 2410 com.google.protobuf.ByteString b = 2411 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2412 crossRealmTrustRealm_ = b; 2413 return b; 2414 } else { 2415 return (com.google.protobuf.ByteString) ref; 2416 } 2417 } 2418 /** 2419 * 2420 * 2421 * <pre> 2422 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 2423 * the user enable cross realm trust. 2424 * </pre> 2425 * 2426 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 2427 * 2428 * @param value The crossRealmTrustRealm to set. 2429 * @return This builder for chaining. 2430 */ setCrossRealmTrustRealm(java.lang.String value)2431 public Builder setCrossRealmTrustRealm(java.lang.String value) { 2432 if (value == null) { 2433 throw new NullPointerException(); 2434 } 2435 crossRealmTrustRealm_ = value; 2436 bitField0_ |= 0x00000100; 2437 onChanged(); 2438 return this; 2439 } 2440 /** 2441 * 2442 * 2443 * <pre> 2444 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 2445 * the user enable cross realm trust. 2446 * </pre> 2447 * 2448 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 2449 * 2450 * @return This builder for chaining. 2451 */ clearCrossRealmTrustRealm()2452 public Builder clearCrossRealmTrustRealm() { 2453 crossRealmTrustRealm_ = getDefaultInstance().getCrossRealmTrustRealm(); 2454 bitField0_ = (bitField0_ & ~0x00000100); 2455 onChanged(); 2456 return this; 2457 } 2458 /** 2459 * 2460 * 2461 * <pre> 2462 * Optional. The remote realm the Dataproc on-cluster KDC will trust, should 2463 * the user enable cross realm trust. 2464 * </pre> 2465 * 2466 * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code> 2467 * 2468 * @param value The bytes for crossRealmTrustRealm to set. 2469 * @return This builder for chaining. 2470 */ setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value)2471 public Builder setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value) { 2472 if (value == null) { 2473 throw new NullPointerException(); 2474 } 2475 checkByteStringIsUtf8(value); 2476 crossRealmTrustRealm_ = value; 2477 bitField0_ |= 0x00000100; 2478 onChanged(); 2479 return this; 2480 } 2481 2482 private java.lang.Object crossRealmTrustKdc_ = ""; 2483 /** 2484 * 2485 * 2486 * <pre> 2487 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 2488 * realm trust relationship. 2489 * </pre> 2490 * 2491 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 2492 * 2493 * @return The crossRealmTrustKdc. 2494 */ getCrossRealmTrustKdc()2495 public java.lang.String getCrossRealmTrustKdc() { 2496 java.lang.Object ref = crossRealmTrustKdc_; 2497 if (!(ref instanceof java.lang.String)) { 2498 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2499 java.lang.String s = bs.toStringUtf8(); 2500 crossRealmTrustKdc_ = s; 2501 return s; 2502 } else { 2503 return (java.lang.String) ref; 2504 } 2505 } 2506 /** 2507 * 2508 * 2509 * <pre> 2510 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 2511 * realm trust relationship. 2512 * </pre> 2513 * 2514 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 2515 * 2516 * @return The bytes for crossRealmTrustKdc. 2517 */ getCrossRealmTrustKdcBytes()2518 public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() { 2519 java.lang.Object ref = crossRealmTrustKdc_; 2520 if (ref instanceof String) { 2521 com.google.protobuf.ByteString b = 2522 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2523 crossRealmTrustKdc_ = b; 2524 return b; 2525 } else { 2526 return (com.google.protobuf.ByteString) ref; 2527 } 2528 } 2529 /** 2530 * 2531 * 2532 * <pre> 2533 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 2534 * realm trust relationship. 2535 * </pre> 2536 * 2537 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 2538 * 2539 * @param value The crossRealmTrustKdc to set. 2540 * @return This builder for chaining. 2541 */ setCrossRealmTrustKdc(java.lang.String value)2542 public Builder setCrossRealmTrustKdc(java.lang.String value) { 2543 if (value == null) { 2544 throw new NullPointerException(); 2545 } 2546 crossRealmTrustKdc_ = value; 2547 bitField0_ |= 0x00000200; 2548 onChanged(); 2549 return this; 2550 } 2551 /** 2552 * 2553 * 2554 * <pre> 2555 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 2556 * realm trust relationship. 2557 * </pre> 2558 * 2559 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 2560 * 2561 * @return This builder for chaining. 2562 */ clearCrossRealmTrustKdc()2563 public Builder clearCrossRealmTrustKdc() { 2564 crossRealmTrustKdc_ = getDefaultInstance().getCrossRealmTrustKdc(); 2565 bitField0_ = (bitField0_ & ~0x00000200); 2566 onChanged(); 2567 return this; 2568 } 2569 /** 2570 * 2571 * 2572 * <pre> 2573 * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross 2574 * realm trust relationship. 2575 * </pre> 2576 * 2577 * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code> 2578 * 2579 * @param value The bytes for crossRealmTrustKdc to set. 2580 * @return This builder for chaining. 2581 */ setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value)2582 public Builder setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value) { 2583 if (value == null) { 2584 throw new NullPointerException(); 2585 } 2586 checkByteStringIsUtf8(value); 2587 crossRealmTrustKdc_ = value; 2588 bitField0_ |= 0x00000200; 2589 onChanged(); 2590 return this; 2591 } 2592 2593 private java.lang.Object crossRealmTrustAdminServer_ = ""; 2594 /** 2595 * 2596 * 2597 * <pre> 2598 * Optional. The admin server (IP or hostname) for the remote trusted realm in 2599 * a cross realm trust relationship. 2600 * </pre> 2601 * 2602 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 2603 * </code> 2604 * 2605 * @return The crossRealmTrustAdminServer. 2606 */ getCrossRealmTrustAdminServer()2607 public java.lang.String getCrossRealmTrustAdminServer() { 2608 java.lang.Object ref = crossRealmTrustAdminServer_; 2609 if (!(ref instanceof java.lang.String)) { 2610 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2611 java.lang.String s = bs.toStringUtf8(); 2612 crossRealmTrustAdminServer_ = s; 2613 return s; 2614 } else { 2615 return (java.lang.String) ref; 2616 } 2617 } 2618 /** 2619 * 2620 * 2621 * <pre> 2622 * Optional. The admin server (IP or hostname) for the remote trusted realm in 2623 * a cross realm trust relationship. 2624 * </pre> 2625 * 2626 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 2627 * </code> 2628 * 2629 * @return The bytes for crossRealmTrustAdminServer. 2630 */ getCrossRealmTrustAdminServerBytes()2631 public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() { 2632 java.lang.Object ref = crossRealmTrustAdminServer_; 2633 if (ref instanceof String) { 2634 com.google.protobuf.ByteString b = 2635 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2636 crossRealmTrustAdminServer_ = b; 2637 return b; 2638 } else { 2639 return (com.google.protobuf.ByteString) ref; 2640 } 2641 } 2642 /** 2643 * 2644 * 2645 * <pre> 2646 * Optional. The admin server (IP or hostname) for the remote trusted realm in 2647 * a cross realm trust relationship. 2648 * </pre> 2649 * 2650 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 2651 * </code> 2652 * 2653 * @param value The crossRealmTrustAdminServer to set. 2654 * @return This builder for chaining. 2655 */ setCrossRealmTrustAdminServer(java.lang.String value)2656 public Builder setCrossRealmTrustAdminServer(java.lang.String value) { 2657 if (value == null) { 2658 throw new NullPointerException(); 2659 } 2660 crossRealmTrustAdminServer_ = value; 2661 bitField0_ |= 0x00000400; 2662 onChanged(); 2663 return this; 2664 } 2665 /** 2666 * 2667 * 2668 * <pre> 2669 * Optional. The admin server (IP or hostname) for the remote trusted realm in 2670 * a cross realm trust relationship. 2671 * </pre> 2672 * 2673 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 2674 * </code> 2675 * 2676 * @return This builder for chaining. 2677 */ clearCrossRealmTrustAdminServer()2678 public Builder clearCrossRealmTrustAdminServer() { 2679 crossRealmTrustAdminServer_ = getDefaultInstance().getCrossRealmTrustAdminServer(); 2680 bitField0_ = (bitField0_ & ~0x00000400); 2681 onChanged(); 2682 return this; 2683 } 2684 /** 2685 * 2686 * 2687 * <pre> 2688 * Optional. The admin server (IP or hostname) for the remote trusted realm in 2689 * a cross realm trust relationship. 2690 * </pre> 2691 * 2692 * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; 2693 * </code> 2694 * 2695 * @param value The bytes for crossRealmTrustAdminServer to set. 2696 * @return This builder for chaining. 2697 */ setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value)2698 public Builder setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value) { 2699 if (value == null) { 2700 throw new NullPointerException(); 2701 } 2702 checkByteStringIsUtf8(value); 2703 crossRealmTrustAdminServer_ = value; 2704 bitField0_ |= 0x00000400; 2705 onChanged(); 2706 return this; 2707 } 2708 2709 private java.lang.Object crossRealmTrustSharedPasswordUri_ = ""; 2710 /** 2711 * 2712 * 2713 * <pre> 2714 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2715 * shared password between the on-cluster Kerberos realm and the remote 2716 * trusted realm, in a cross realm trust relationship. 2717 * </pre> 2718 * 2719 * <code> 2720 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 2721 * </code> 2722 * 2723 * @return The crossRealmTrustSharedPasswordUri. 2724 */ getCrossRealmTrustSharedPasswordUri()2725 public java.lang.String getCrossRealmTrustSharedPasswordUri() { 2726 java.lang.Object ref = crossRealmTrustSharedPasswordUri_; 2727 if (!(ref instanceof java.lang.String)) { 2728 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2729 java.lang.String s = bs.toStringUtf8(); 2730 crossRealmTrustSharedPasswordUri_ = s; 2731 return s; 2732 } else { 2733 return (java.lang.String) ref; 2734 } 2735 } 2736 /** 2737 * 2738 * 2739 * <pre> 2740 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2741 * shared password between the on-cluster Kerberos realm and the remote 2742 * trusted realm, in a cross realm trust relationship. 2743 * </pre> 2744 * 2745 * <code> 2746 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 2747 * </code> 2748 * 2749 * @return The bytes for crossRealmTrustSharedPasswordUri. 2750 */ getCrossRealmTrustSharedPasswordUriBytes()2751 public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() { 2752 java.lang.Object ref = crossRealmTrustSharedPasswordUri_; 2753 if (ref instanceof String) { 2754 com.google.protobuf.ByteString b = 2755 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2756 crossRealmTrustSharedPasswordUri_ = b; 2757 return b; 2758 } else { 2759 return (com.google.protobuf.ByteString) ref; 2760 } 2761 } 2762 /** 2763 * 2764 * 2765 * <pre> 2766 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2767 * shared password between the on-cluster Kerberos realm and the remote 2768 * trusted realm, in a cross realm trust relationship. 2769 * </pre> 2770 * 2771 * <code> 2772 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 2773 * </code> 2774 * 2775 * @param value The crossRealmTrustSharedPasswordUri to set. 2776 * @return This builder for chaining. 2777 */ setCrossRealmTrustSharedPasswordUri(java.lang.String value)2778 public Builder setCrossRealmTrustSharedPasswordUri(java.lang.String value) { 2779 if (value == null) { 2780 throw new NullPointerException(); 2781 } 2782 crossRealmTrustSharedPasswordUri_ = value; 2783 bitField0_ |= 0x00000800; 2784 onChanged(); 2785 return this; 2786 } 2787 /** 2788 * 2789 * 2790 * <pre> 2791 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2792 * shared password between the on-cluster Kerberos realm and the remote 2793 * trusted realm, in a cross realm trust relationship. 2794 * </pre> 2795 * 2796 * <code> 2797 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 2798 * </code> 2799 * 2800 * @return This builder for chaining. 2801 */ clearCrossRealmTrustSharedPasswordUri()2802 public Builder clearCrossRealmTrustSharedPasswordUri() { 2803 crossRealmTrustSharedPasswordUri_ = 2804 getDefaultInstance().getCrossRealmTrustSharedPasswordUri(); 2805 bitField0_ = (bitField0_ & ~0x00000800); 2806 onChanged(); 2807 return this; 2808 } 2809 /** 2810 * 2811 * 2812 * <pre> 2813 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2814 * shared password between the on-cluster Kerberos realm and the remote 2815 * trusted realm, in a cross realm trust relationship. 2816 * </pre> 2817 * 2818 * <code> 2819 * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; 2820 * </code> 2821 * 2822 * @param value The bytes for crossRealmTrustSharedPasswordUri to set. 2823 * @return This builder for chaining. 2824 */ setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value)2825 public Builder setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value) { 2826 if (value == null) { 2827 throw new NullPointerException(); 2828 } 2829 checkByteStringIsUtf8(value); 2830 crossRealmTrustSharedPasswordUri_ = value; 2831 bitField0_ |= 0x00000800; 2832 onChanged(); 2833 return this; 2834 } 2835 2836 private java.lang.Object kdcDbKeyUri_ = ""; 2837 /** 2838 * 2839 * 2840 * <pre> 2841 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2842 * master key of the KDC database. 2843 * </pre> 2844 * 2845 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 2846 * 2847 * @return The kdcDbKeyUri. 2848 */ getKdcDbKeyUri()2849 public java.lang.String getKdcDbKeyUri() { 2850 java.lang.Object ref = kdcDbKeyUri_; 2851 if (!(ref instanceof java.lang.String)) { 2852 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 2853 java.lang.String s = bs.toStringUtf8(); 2854 kdcDbKeyUri_ = s; 2855 return s; 2856 } else { 2857 return (java.lang.String) ref; 2858 } 2859 } 2860 /** 2861 * 2862 * 2863 * <pre> 2864 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2865 * master key of the KDC database. 2866 * </pre> 2867 * 2868 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 2869 * 2870 * @return The bytes for kdcDbKeyUri. 2871 */ getKdcDbKeyUriBytes()2872 public com.google.protobuf.ByteString getKdcDbKeyUriBytes() { 2873 java.lang.Object ref = kdcDbKeyUri_; 2874 if (ref instanceof String) { 2875 com.google.protobuf.ByteString b = 2876 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 2877 kdcDbKeyUri_ = b; 2878 return b; 2879 } else { 2880 return (com.google.protobuf.ByteString) ref; 2881 } 2882 } 2883 /** 2884 * 2885 * 2886 * <pre> 2887 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2888 * master key of the KDC database. 2889 * </pre> 2890 * 2891 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 2892 * 2893 * @param value The kdcDbKeyUri to set. 2894 * @return This builder for chaining. 2895 */ setKdcDbKeyUri(java.lang.String value)2896 public Builder setKdcDbKeyUri(java.lang.String value) { 2897 if (value == null) { 2898 throw new NullPointerException(); 2899 } 2900 kdcDbKeyUri_ = value; 2901 bitField0_ |= 0x00001000; 2902 onChanged(); 2903 return this; 2904 } 2905 /** 2906 * 2907 * 2908 * <pre> 2909 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2910 * master key of the KDC database. 2911 * </pre> 2912 * 2913 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 2914 * 2915 * @return This builder for chaining. 2916 */ clearKdcDbKeyUri()2917 public Builder clearKdcDbKeyUri() { 2918 kdcDbKeyUri_ = getDefaultInstance().getKdcDbKeyUri(); 2919 bitField0_ = (bitField0_ & ~0x00001000); 2920 onChanged(); 2921 return this; 2922 } 2923 /** 2924 * 2925 * 2926 * <pre> 2927 * Optional. The Cloud Storage URI of a KMS encrypted file containing the 2928 * master key of the KDC database. 2929 * </pre> 2930 * 2931 * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code> 2932 * 2933 * @param value The bytes for kdcDbKeyUri to set. 2934 * @return This builder for chaining. 2935 */ setKdcDbKeyUriBytes(com.google.protobuf.ByteString value)2936 public Builder setKdcDbKeyUriBytes(com.google.protobuf.ByteString value) { 2937 if (value == null) { 2938 throw new NullPointerException(); 2939 } 2940 checkByteStringIsUtf8(value); 2941 kdcDbKeyUri_ = value; 2942 bitField0_ |= 0x00001000; 2943 onChanged(); 2944 return this; 2945 } 2946 2947 private int tgtLifetimeHours_; 2948 /** 2949 * 2950 * 2951 * <pre> 2952 * Optional. The lifetime of the ticket granting ticket, in hours. 2953 * If not specified, or user specifies 0, then default value 10 2954 * will be used. 2955 * </pre> 2956 * 2957 * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code> 2958 * 2959 * @return The tgtLifetimeHours. 2960 */ 2961 @java.lang.Override getTgtLifetimeHours()2962 public int getTgtLifetimeHours() { 2963 return tgtLifetimeHours_; 2964 } 2965 /** 2966 * 2967 * 2968 * <pre> 2969 * Optional. The lifetime of the ticket granting ticket, in hours. 2970 * If not specified, or user specifies 0, then default value 10 2971 * will be used. 2972 * </pre> 2973 * 2974 * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code> 2975 * 2976 * @param value The tgtLifetimeHours to set. 2977 * @return This builder for chaining. 2978 */ setTgtLifetimeHours(int value)2979 public Builder setTgtLifetimeHours(int value) { 2980 2981 tgtLifetimeHours_ = value; 2982 bitField0_ |= 0x00002000; 2983 onChanged(); 2984 return this; 2985 } 2986 /** 2987 * 2988 * 2989 * <pre> 2990 * Optional. The lifetime of the ticket granting ticket, in hours. 2991 * If not specified, or user specifies 0, then default value 10 2992 * will be used. 2993 * </pre> 2994 * 2995 * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code> 2996 * 2997 * @return This builder for chaining. 2998 */ clearTgtLifetimeHours()2999 public Builder clearTgtLifetimeHours() { 3000 bitField0_ = (bitField0_ & ~0x00002000); 3001 tgtLifetimeHours_ = 0; 3002 onChanged(); 3003 return this; 3004 } 3005 3006 private java.lang.Object realm_ = ""; 3007 /** 3008 * 3009 * 3010 * <pre> 3011 * Optional. The name of the on-cluster Kerberos realm. 3012 * If not specified, the uppercased domain of hostnames will be the realm. 3013 * </pre> 3014 * 3015 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 3016 * 3017 * @return The realm. 3018 */ getRealm()3019 public java.lang.String getRealm() { 3020 java.lang.Object ref = realm_; 3021 if (!(ref instanceof java.lang.String)) { 3022 com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; 3023 java.lang.String s = bs.toStringUtf8(); 3024 realm_ = s; 3025 return s; 3026 } else { 3027 return (java.lang.String) ref; 3028 } 3029 } 3030 /** 3031 * 3032 * 3033 * <pre> 3034 * Optional. The name of the on-cluster Kerberos realm. 3035 * If not specified, the uppercased domain of hostnames will be the realm. 3036 * </pre> 3037 * 3038 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 3039 * 3040 * @return The bytes for realm. 3041 */ getRealmBytes()3042 public com.google.protobuf.ByteString getRealmBytes() { 3043 java.lang.Object ref = realm_; 3044 if (ref instanceof String) { 3045 com.google.protobuf.ByteString b = 3046 com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); 3047 realm_ = b; 3048 return b; 3049 } else { 3050 return (com.google.protobuf.ByteString) ref; 3051 } 3052 } 3053 /** 3054 * 3055 * 3056 * <pre> 3057 * Optional. The name of the on-cluster Kerberos realm. 3058 * If not specified, the uppercased domain of hostnames will be the realm. 3059 * </pre> 3060 * 3061 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 3062 * 3063 * @param value The realm to set. 3064 * @return This builder for chaining. 3065 */ setRealm(java.lang.String value)3066 public Builder setRealm(java.lang.String value) { 3067 if (value == null) { 3068 throw new NullPointerException(); 3069 } 3070 realm_ = value; 3071 bitField0_ |= 0x00004000; 3072 onChanged(); 3073 return this; 3074 } 3075 /** 3076 * 3077 * 3078 * <pre> 3079 * Optional. The name of the on-cluster Kerberos realm. 3080 * If not specified, the uppercased domain of hostnames will be the realm. 3081 * </pre> 3082 * 3083 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 3084 * 3085 * @return This builder for chaining. 3086 */ clearRealm()3087 public Builder clearRealm() { 3088 realm_ = getDefaultInstance().getRealm(); 3089 bitField0_ = (bitField0_ & ~0x00004000); 3090 onChanged(); 3091 return this; 3092 } 3093 /** 3094 * 3095 * 3096 * <pre> 3097 * Optional. The name of the on-cluster Kerberos realm. 3098 * If not specified, the uppercased domain of hostnames will be the realm. 3099 * </pre> 3100 * 3101 * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code> 3102 * 3103 * @param value The bytes for realm to set. 3104 * @return This builder for chaining. 3105 */ setRealmBytes(com.google.protobuf.ByteString value)3106 public Builder setRealmBytes(com.google.protobuf.ByteString value) { 3107 if (value == null) { 3108 throw new NullPointerException(); 3109 } 3110 checkByteStringIsUtf8(value); 3111 realm_ = value; 3112 bitField0_ |= 0x00004000; 3113 onChanged(); 3114 return this; 3115 } 3116 3117 @java.lang.Override setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields)3118 public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { 3119 return super.setUnknownFields(unknownFields); 3120 } 3121 3122 @java.lang.Override mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields)3123 public final Builder mergeUnknownFields( 3124 final com.google.protobuf.UnknownFieldSet unknownFields) { 3125 return super.mergeUnknownFields(unknownFields); 3126 } 3127 3128 // @@protoc_insertion_point(builder_scope:google.cloud.dataproc.v1.KerberosConfig) 3129 } 3130 3131 // @@protoc_insertion_point(class_scope:google.cloud.dataproc.v1.KerberosConfig) 3132 private static final com.google.cloud.dataproc.v1.KerberosConfig DEFAULT_INSTANCE; 3133 3134 static { 3135 DEFAULT_INSTANCE = new com.google.cloud.dataproc.v1.KerberosConfig(); 3136 } 3137 getDefaultInstance()3138 public static com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstance() { 3139 return DEFAULT_INSTANCE; 3140 } 3141 3142 private static final com.google.protobuf.Parser<KerberosConfig> PARSER = 3143 new com.google.protobuf.AbstractParser<KerberosConfig>() { 3144 @java.lang.Override 3145 public KerberosConfig parsePartialFrom( 3146 com.google.protobuf.CodedInputStream input, 3147 com.google.protobuf.ExtensionRegistryLite extensionRegistry) 3148 throws com.google.protobuf.InvalidProtocolBufferException { 3149 Builder builder = newBuilder(); 3150 try { 3151 builder.mergeFrom(input, extensionRegistry); 3152 } catch (com.google.protobuf.InvalidProtocolBufferException e) { 3153 throw e.setUnfinishedMessage(builder.buildPartial()); 3154 } catch (com.google.protobuf.UninitializedMessageException e) { 3155 throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); 3156 } catch (java.io.IOException e) { 3157 throw new com.google.protobuf.InvalidProtocolBufferException(e) 3158 .setUnfinishedMessage(builder.buildPartial()); 3159 } 3160 return builder.buildPartial(); 3161 } 3162 }; 3163 parser()3164 public static com.google.protobuf.Parser<KerberosConfig> parser() { 3165 return PARSER; 3166 } 3167 3168 @java.lang.Override getParserForType()3169 public com.google.protobuf.Parser<KerberosConfig> getParserForType() { 3170 return PARSER; 3171 } 3172 3173 @java.lang.Override getDefaultInstanceForType()3174 public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() { 3175 return DEFAULT_INSTANCE; 3176 } 3177 } 3178