TransparencyLogInstance.java
// Generated by the protocol buffer compiler. DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: sigstore_trustroot.proto
// Protobuf Java Version: 4.30.2
package dev.sigstore.proto.trustroot.v1;
/**
* <pre>
* TransparencyLogInstance describes the immutable parameters from a
* transparency log.
* See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters
* for more details.
* The included parameters are the minimal set required to identify a log,
* and verify an inclusion proof/promise.
* </pre>
*
* Protobuf type {@code dev.sigstore.trustroot.v1.TransparencyLogInstance}
*/
@javax.annotation.Generated(value="protoc", comments="annotations:TransparencyLogInstance.java.pb.meta")
public final class TransparencyLogInstance extends
com.google.protobuf.GeneratedMessage implements
// @@protoc_insertion_point(message_implements:dev.sigstore.trustroot.v1.TransparencyLogInstance)
TransparencyLogInstanceOrBuilder {
private static final long serialVersionUID = 0L;
static {
com.google.protobuf.RuntimeVersion.validateProtobufGencodeVersion(
com.google.protobuf.RuntimeVersion.RuntimeDomain.PUBLIC,
/* major= */ 4,
/* minor= */ 30,
/* patch= */ 2,
/* suffix= */ "",
TransparencyLogInstance.class.getName());
}
// Use TransparencyLogInstance.newBuilder() to construct.
private TransparencyLogInstance(com.google.protobuf.GeneratedMessage.Builder<?> builder) {
super(builder);
}
private TransparencyLogInstance() {
baseUrl_ = "";
hashAlgorithm_ = 0;
operator_ = "";
}
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
internalGetFieldAccessorTable() {
return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_fieldAccessorTable
.ensureFieldAccessorsInitialized(
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.class, dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder.class);
}
private int bitField0_;
public static final int BASE_URL_FIELD_NUMBER = 1;
@SuppressWarnings("serial")
private volatile java.lang.Object baseUrl_ = "";
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @return The baseUrl.
*/
@java.lang.Override
public java.lang.String getBaseUrl() {
java.lang.Object ref = baseUrl_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs =
(com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
baseUrl_ = s;
return s;
}
}
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @return The bytes for baseUrl.
*/
@java.lang.Override
public com.google.protobuf.ByteString
getBaseUrlBytes() {
java.lang.Object ref = baseUrl_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8(
(java.lang.String) ref);
baseUrl_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int HASH_ALGORITHM_FIELD_NUMBER = 2;
private int hashAlgorithm_ = 0;
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @return The enum numeric value on the wire for hashAlgorithm.
*/
@java.lang.Override public int getHashAlgorithmValue() {
return hashAlgorithm_;
}
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @return The hashAlgorithm.
*/
@java.lang.Override public dev.sigstore.proto.common.v1.HashAlgorithm getHashAlgorithm() {
dev.sigstore.proto.common.v1.HashAlgorithm result = dev.sigstore.proto.common.v1.HashAlgorithm.forNumber(hashAlgorithm_);
return result == null ? dev.sigstore.proto.common.v1.HashAlgorithm.UNRECOGNIZED : result;
}
public static final int PUBLIC_KEY_FIELD_NUMBER = 3;
private dev.sigstore.proto.common.v1.PublicKey publicKey_;
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
* @return Whether the publicKey field is set.
*/
@java.lang.Override
public boolean hasPublicKey() {
return ((bitField0_ & 0x00000001) != 0);
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
* @return The publicKey.
*/
@java.lang.Override
public dev.sigstore.proto.common.v1.PublicKey getPublicKey() {
return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
@java.lang.Override
public dev.sigstore.proto.common.v1.PublicKeyOrBuilder getPublicKeyOrBuilder() {
return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
}
public static final int LOG_ID_FIELD_NUMBER = 4;
private dev.sigstore.proto.common.v1.LogId logId_;
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
* @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
* See sigstore_trustroot.proto;l=53
* @return Whether the logId field is set.
*/
@java.lang.Override
@java.lang.Deprecated public boolean hasLogId() {
return ((bitField0_ & 0x00000002) != 0);
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
* @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
* See sigstore_trustroot.proto;l=53
* @return The logId.
*/
@java.lang.Override
@java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId getLogId() {
return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Override
@java.lang.Deprecated public dev.sigstore.proto.common.v1.LogIdOrBuilder getLogIdOrBuilder() {
return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
}
public static final int CHECKPOINT_KEY_ID_FIELD_NUMBER = 5;
private dev.sigstore.proto.common.v1.LogId checkpointKeyId_;
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
* @return Whether the checkpointKeyId field is set.
*/
@java.lang.Override
public boolean hasCheckpointKeyId() {
return ((bitField0_ & 0x00000004) != 0);
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
* @return The checkpointKeyId.
*/
@java.lang.Override
public dev.sigstore.proto.common.v1.LogId getCheckpointKeyId() {
return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
@java.lang.Override
public dev.sigstore.proto.common.v1.LogIdOrBuilder getCheckpointKeyIdOrBuilder() {
return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
}
public static final int OPERATOR_FIELD_NUMBER = 6;
@SuppressWarnings("serial")
private volatile java.lang.Object operator_ = "";
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @return The operator.
*/
@java.lang.Override
public java.lang.String getOperator() {
java.lang.Object ref = operator_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs =
(com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
operator_ = s;
return s;
}
}
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @return The bytes for operator.
*/
@java.lang.Override
public com.google.protobuf.ByteString
getOperatorBytes() {
java.lang.Object ref = operator_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8(
(java.lang.String) ref);
operator_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output)
throws java.io.IOException {
if (!com.google.protobuf.GeneratedMessage.isStringEmpty(baseUrl_)) {
com.google.protobuf.GeneratedMessage.writeString(output, 1, baseUrl_);
}
if (hashAlgorithm_ != dev.sigstore.proto.common.v1.HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED.getNumber()) {
output.writeEnum(2, hashAlgorithm_);
}
if (((bitField0_ & 0x00000001) != 0)) {
output.writeMessage(3, getPublicKey());
}
if (((bitField0_ & 0x00000002) != 0)) {
output.writeMessage(4, getLogId());
}
if (((bitField0_ & 0x00000004) != 0)) {
output.writeMessage(5, getCheckpointKeyId());
}
if (!com.google.protobuf.GeneratedMessage.isStringEmpty(operator_)) {
com.google.protobuf.GeneratedMessage.writeString(output, 6, operator_);
}
getUnknownFields().writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
if (!com.google.protobuf.GeneratedMessage.isStringEmpty(baseUrl_)) {
size += com.google.protobuf.GeneratedMessage.computeStringSize(1, baseUrl_);
}
if (hashAlgorithm_ != dev.sigstore.proto.common.v1.HashAlgorithm.HASH_ALGORITHM_UNSPECIFIED.getNumber()) {
size += com.google.protobuf.CodedOutputStream
.computeEnumSize(2, hashAlgorithm_);
}
if (((bitField0_ & 0x00000001) != 0)) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(3, getPublicKey());
}
if (((bitField0_ & 0x00000002) != 0)) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(4, getLogId());
}
if (((bitField0_ & 0x00000004) != 0)) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(5, getCheckpointKeyId());
}
if (!com.google.protobuf.GeneratedMessage.isStringEmpty(operator_)) {
size += com.google.protobuf.GeneratedMessage.computeStringSize(6, operator_);
}
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof dev.sigstore.proto.trustroot.v1.TransparencyLogInstance)) {
return super.equals(obj);
}
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance other = (dev.sigstore.proto.trustroot.v1.TransparencyLogInstance) obj;
if (!getBaseUrl()
.equals(other.getBaseUrl())) return false;
if (hashAlgorithm_ != other.hashAlgorithm_) return false;
if (hasPublicKey() != other.hasPublicKey()) return false;
if (hasPublicKey()) {
if (!getPublicKey()
.equals(other.getPublicKey())) return false;
}
if (hasLogId() != other.hasLogId()) return false;
if (hasLogId()) {
if (!getLogId()
.equals(other.getLogId())) return false;
}
if (hasCheckpointKeyId() != other.hasCheckpointKeyId()) return false;
if (hasCheckpointKeyId()) {
if (!getCheckpointKeyId()
.equals(other.getCheckpointKeyId())) return false;
}
if (!getOperator()
.equals(other.getOperator())) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
hash = (37 * hash) + BASE_URL_FIELD_NUMBER;
hash = (53 * hash) + getBaseUrl().hashCode();
hash = (37 * hash) + HASH_ALGORITHM_FIELD_NUMBER;
hash = (53 * hash) + hashAlgorithm_;
if (hasPublicKey()) {
hash = (37 * hash) + PUBLIC_KEY_FIELD_NUMBER;
hash = (53 * hash) + getPublicKey().hashCode();
}
if (hasLogId()) {
hash = (37 * hash) + LOG_ID_FIELD_NUMBER;
hash = (53 * hash) + getLogId().hashCode();
}
if (hasCheckpointKeyId()) {
hash = (37 * hash) + CHECKPOINT_KEY_ID_FIELD_NUMBER;
hash = (53 * hash) + getCheckpointKeyId().hashCode();
}
hash = (37 * hash) + OPERATOR_FIELD_NUMBER;
hash = (53 * hash) + getOperator().hashCode();
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input, extensionRegistry);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseDelimitedWithIOException(PARSER, input);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseDelimitedWithIOException(PARSER, input, extensionRegistry);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input);
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() { return newBuilder(); }
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE
? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(
com.google.protobuf.GeneratedMessage.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
* <pre>
* TransparencyLogInstance describes the immutable parameters from a
* transparency log.
* See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters
* for more details.
* The included parameters are the minimal set required to identify a log,
* and verify an inclusion proof/promise.
* </pre>
*
* Protobuf type {@code dev.sigstore.trustroot.v1.TransparencyLogInstance}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessage.Builder<Builder> implements
// @@protoc_insertion_point(builder_implements:dev.sigstore.trustroot.v1.TransparencyLogInstance)
dev.sigstore.proto.trustroot.v1.TransparencyLogInstanceOrBuilder {
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
internalGetFieldAccessorTable() {
return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_fieldAccessorTable
.ensureFieldAccessorsInitialized(
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.class, dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder.class);
}
// Construct using dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.newBuilder()
private Builder() {
maybeForceBuilderInitialization();
}
private Builder(
com.google.protobuf.GeneratedMessage.BuilderParent parent) {
super(parent);
maybeForceBuilderInitialization();
}
private void maybeForceBuilderInitialization() {
if (com.google.protobuf.GeneratedMessage
.alwaysUseFieldBuilders) {
internalGetPublicKeyFieldBuilder();
internalGetLogIdFieldBuilder();
internalGetCheckpointKeyIdFieldBuilder();
}
}
@java.lang.Override
public Builder clear() {
super.clear();
bitField0_ = 0;
baseUrl_ = "";
hashAlgorithm_ = 0;
publicKey_ = null;
if (publicKeyBuilder_ != null) {
publicKeyBuilder_.dispose();
publicKeyBuilder_ = null;
}
logId_ = null;
if (logIdBuilder_ != null) {
logIdBuilder_.dispose();
logIdBuilder_ = null;
}
checkpointKeyId_ = null;
if (checkpointKeyIdBuilder_ != null) {
checkpointKeyIdBuilder_.dispose();
checkpointKeyIdBuilder_ = null;
}
operator_ = "";
return this;
}
@java.lang.Override
public com.google.protobuf.Descriptors.Descriptor
getDescriptorForType() {
return dev.sigstore.proto.trustroot.v1.TrustRootProto.internal_static_dev_sigstore_trustroot_v1_TransparencyLogInstance_descriptor;
}
@java.lang.Override
public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstanceForType() {
return dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.getDefaultInstance();
}
@java.lang.Override
public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance build() {
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result = buildPartial();
if (!result.isInitialized()) {
throw newUninitializedMessageException(result);
}
return result;
}
@java.lang.Override
public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance buildPartial() {
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result = new dev.sigstore.proto.trustroot.v1.TransparencyLogInstance(this);
if (bitField0_ != 0) { buildPartial0(result); }
onBuilt();
return result;
}
private void buildPartial0(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance result) {
int from_bitField0_ = bitField0_;
if (((from_bitField0_ & 0x00000001) != 0)) {
result.baseUrl_ = baseUrl_;
}
if (((from_bitField0_ & 0x00000002) != 0)) {
result.hashAlgorithm_ = hashAlgorithm_;
}
int to_bitField0_ = 0;
if (((from_bitField0_ & 0x00000004) != 0)) {
result.publicKey_ = publicKeyBuilder_ == null
? publicKey_
: publicKeyBuilder_.build();
to_bitField0_ |= 0x00000001;
}
if (((from_bitField0_ & 0x00000008) != 0)) {
result.logId_ = logIdBuilder_ == null
? logId_
: logIdBuilder_.build();
to_bitField0_ |= 0x00000002;
}
if (((from_bitField0_ & 0x00000010) != 0)) {
result.checkpointKeyId_ = checkpointKeyIdBuilder_ == null
? checkpointKeyId_
: checkpointKeyIdBuilder_.build();
to_bitField0_ |= 0x00000004;
}
if (((from_bitField0_ & 0x00000020) != 0)) {
result.operator_ = operator_;
}
result.bitField0_ |= to_bitField0_;
}
@java.lang.Override
public Builder mergeFrom(com.google.protobuf.Message other) {
if (other instanceof dev.sigstore.proto.trustroot.v1.TransparencyLogInstance) {
return mergeFrom((dev.sigstore.proto.trustroot.v1.TransparencyLogInstance)other);
} else {
super.mergeFrom(other);
return this;
}
}
public Builder mergeFrom(dev.sigstore.proto.trustroot.v1.TransparencyLogInstance other) {
if (other == dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.getDefaultInstance()) return this;
if (!other.getBaseUrl().isEmpty()) {
baseUrl_ = other.baseUrl_;
bitField0_ |= 0x00000001;
onChanged();
}
if (other.hashAlgorithm_ != 0) {
setHashAlgorithmValue(other.getHashAlgorithmValue());
}
if (other.hasPublicKey()) {
mergePublicKey(other.getPublicKey());
}
if (other.hasLogId()) {
mergeLogId(other.getLogId());
}
if (other.hasCheckpointKeyId()) {
mergeCheckpointKeyId(other.getCheckpointKeyId());
}
if (!other.getOperator().isEmpty()) {
operator_ = other.operator_;
bitField0_ |= 0x00000020;
onChanged();
}
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
}
@java.lang.Override
public final boolean isInitialized() {
return true;
}
@java.lang.Override
public Builder mergeFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
if (extensionRegistry == null) {
throw new java.lang.NullPointerException();
}
try {
boolean done = false;
while (!done) {
int tag = input.readTag();
switch (tag) {
case 0:
done = true;
break;
case 10: {
baseUrl_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000001;
break;
} // case 10
case 16: {
hashAlgorithm_ = input.readEnum();
bitField0_ |= 0x00000002;
break;
} // case 16
case 26: {
input.readMessage(
internalGetPublicKeyFieldBuilder().getBuilder(),
extensionRegistry);
bitField0_ |= 0x00000004;
break;
} // case 26
case 34: {
input.readMessage(
internalGetLogIdFieldBuilder().getBuilder(),
extensionRegistry);
bitField0_ |= 0x00000008;
break;
} // case 34
case 42: {
input.readMessage(
internalGetCheckpointKeyIdFieldBuilder().getBuilder(),
extensionRegistry);
bitField0_ |= 0x00000010;
break;
} // case 42
case 50: {
operator_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000020;
break;
} // case 50
default: {
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
done = true; // was an endgroup tag
}
break;
} // default:
} // switch (tag)
} // while (!done)
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.unwrapIOException();
} finally {
onChanged();
} // finally
return this;
}
private int bitField0_;
private java.lang.Object baseUrl_ = "";
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @return The baseUrl.
*/
public java.lang.String getBaseUrl() {
java.lang.Object ref = baseUrl_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs =
(com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
baseUrl_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @return The bytes for baseUrl.
*/
public com.google.protobuf.ByteString
getBaseUrlBytes() {
java.lang.Object ref = baseUrl_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8(
(java.lang.String) ref);
baseUrl_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @param value The baseUrl to set.
* @return This builder for chaining.
*/
public Builder setBaseUrl(
java.lang.String value) {
if (value == null) { throw new NullPointerException(); }
baseUrl_ = value;
bitField0_ |= 0x00000001;
onChanged();
return this;
}
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @return This builder for chaining.
*/
public Builder clearBaseUrl() {
baseUrl_ = getDefaultInstance().getBaseUrl();
bitField0_ = (bitField0_ & ~0x00000001);
onChanged();
return this;
}
/**
* <pre>
* The base URL at which can be used to URLs for the client.
* SHOULD match the origin on the log checkpoint:
* https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
* </pre>
*
* <code>string base_url = 1;</code>
* @param value The bytes for baseUrl to set.
* @return This builder for chaining.
*/
public Builder setBaseUrlBytes(
com.google.protobuf.ByteString value) {
if (value == null) { throw new NullPointerException(); }
checkByteStringIsUtf8(value);
baseUrl_ = value;
bitField0_ |= 0x00000001;
onChanged();
return this;
}
private int hashAlgorithm_ = 0;
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @return The enum numeric value on the wire for hashAlgorithm.
*/
@java.lang.Override public int getHashAlgorithmValue() {
return hashAlgorithm_;
}
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @param value The enum numeric value on the wire for hashAlgorithm to set.
* @return This builder for chaining.
*/
public Builder setHashAlgorithmValue(int value) {
hashAlgorithm_ = value;
bitField0_ |= 0x00000002;
onChanged();
return this;
}
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @return The hashAlgorithm.
*/
@java.lang.Override
public dev.sigstore.proto.common.v1.HashAlgorithm getHashAlgorithm() {
dev.sigstore.proto.common.v1.HashAlgorithm result = dev.sigstore.proto.common.v1.HashAlgorithm.forNumber(hashAlgorithm_);
return result == null ? dev.sigstore.proto.common.v1.HashAlgorithm.UNRECOGNIZED : result;
}
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @param value The hashAlgorithm to set.
* @return This builder for chaining.
*/
public Builder setHashAlgorithm(dev.sigstore.proto.common.v1.HashAlgorithm value) {
if (value == null) {
throw new NullPointerException();
}
bitField0_ |= 0x00000002;
hashAlgorithm_ = value.getNumber();
onChanged();
return this;
}
/**
* <pre>
* The hash algorithm used for the Merkle Tree.
* </pre>
*
* <code>.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;</code>
* @return This builder for chaining.
*/
public Builder clearHashAlgorithm() {
bitField0_ = (bitField0_ & ~0x00000002);
hashAlgorithm_ = 0;
onChanged();
return this;
}
private dev.sigstore.proto.common.v1.PublicKey publicKey_;
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder> publicKeyBuilder_;
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
* @return Whether the publicKey field is set.
*/
public boolean hasPublicKey() {
return ((bitField0_ & 0x00000004) != 0);
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
* @return The publicKey.
*/
public dev.sigstore.proto.common.v1.PublicKey getPublicKey() {
if (publicKeyBuilder_ == null) {
return publicKey_ == null ? dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
} else {
return publicKeyBuilder_.getMessage();
}
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public Builder setPublicKey(dev.sigstore.proto.common.v1.PublicKey value) {
if (publicKeyBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
publicKey_ = value;
} else {
publicKeyBuilder_.setMessage(value);
}
bitField0_ |= 0x00000004;
onChanged();
return this;
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public Builder setPublicKey(
dev.sigstore.proto.common.v1.PublicKey.Builder builderForValue) {
if (publicKeyBuilder_ == null) {
publicKey_ = builderForValue.build();
} else {
publicKeyBuilder_.setMessage(builderForValue.build());
}
bitField0_ |= 0x00000004;
onChanged();
return this;
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public Builder mergePublicKey(dev.sigstore.proto.common.v1.PublicKey value) {
if (publicKeyBuilder_ == null) {
if (((bitField0_ & 0x00000004) != 0) &&
publicKey_ != null &&
publicKey_ != dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance()) {
getPublicKeyBuilder().mergeFrom(value);
} else {
publicKey_ = value;
}
} else {
publicKeyBuilder_.mergeFrom(value);
}
if (publicKey_ != null) {
bitField0_ |= 0x00000004;
onChanged();
}
return this;
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public Builder clearPublicKey() {
bitField0_ = (bitField0_ & ~0x00000004);
publicKey_ = null;
if (publicKeyBuilder_ != null) {
publicKeyBuilder_.dispose();
publicKeyBuilder_ = null;
}
onChanged();
return this;
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public dev.sigstore.proto.common.v1.PublicKey.Builder getPublicKeyBuilder() {
bitField0_ |= 0x00000004;
onChanged();
return internalGetPublicKeyFieldBuilder().getBuilder();
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
public dev.sigstore.proto.common.v1.PublicKeyOrBuilder getPublicKeyOrBuilder() {
if (publicKeyBuilder_ != null) {
return publicKeyBuilder_.getMessageOrBuilder();
} else {
return publicKey_ == null ?
dev.sigstore.proto.common.v1.PublicKey.getDefaultInstance() : publicKey_;
}
}
/**
* <pre>
* The public key used to verify signatures generated by the log.
* This attribute contains the signature algorithm used by the log.
* </pre>
*
* <code>.dev.sigstore.common.v1.PublicKey public_key = 3;</code>
*/
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder>
internalGetPublicKeyFieldBuilder() {
if (publicKeyBuilder_ == null) {
publicKeyBuilder_ = new com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.PublicKey, dev.sigstore.proto.common.v1.PublicKey.Builder, dev.sigstore.proto.common.v1.PublicKeyOrBuilder>(
getPublicKey(),
getParentForChildren(),
isClean());
publicKey_ = null;
}
return publicKeyBuilder_;
}
private dev.sigstore.proto.common.v1.LogId logId_;
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> logIdBuilder_;
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
* @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
* See sigstore_trustroot.proto;l=53
* @return Whether the logId field is set.
*/
@java.lang.Deprecated public boolean hasLogId() {
return ((bitField0_ & 0x00000008) != 0);
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
* @deprecated dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.
* See sigstore_trustroot.proto;l=53
* @return The logId.
*/
@java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId getLogId() {
if (logIdBuilder_ == null) {
return logId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
} else {
return logIdBuilder_.getMessage();
}
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public Builder setLogId(dev.sigstore.proto.common.v1.LogId value) {
if (logIdBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
logId_ = value;
} else {
logIdBuilder_.setMessage(value);
}
bitField0_ |= 0x00000008;
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public Builder setLogId(
dev.sigstore.proto.common.v1.LogId.Builder builderForValue) {
if (logIdBuilder_ == null) {
logId_ = builderForValue.build();
} else {
logIdBuilder_.setMessage(builderForValue.build());
}
bitField0_ |= 0x00000008;
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public Builder mergeLogId(dev.sigstore.proto.common.v1.LogId value) {
if (logIdBuilder_ == null) {
if (((bitField0_ & 0x00000008) != 0) &&
logId_ != null &&
logId_ != dev.sigstore.proto.common.v1.LogId.getDefaultInstance()) {
getLogIdBuilder().mergeFrom(value);
} else {
logId_ = value;
}
} else {
logIdBuilder_.mergeFrom(value);
}
if (logId_ != null) {
bitField0_ |= 0x00000008;
onChanged();
}
return this;
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public Builder clearLogId() {
bitField0_ = (bitField0_ & ~0x00000008);
logId_ = null;
if (logIdBuilder_ != null) {
logIdBuilder_.dispose();
logIdBuilder_ = null;
}
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public dev.sigstore.proto.common.v1.LogId.Builder getLogIdBuilder() {
bitField0_ |= 0x00000008;
onChanged();
return internalGetLogIdFieldBuilder().getBuilder();
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
@java.lang.Deprecated public dev.sigstore.proto.common.v1.LogIdOrBuilder getLogIdOrBuilder() {
if (logIdBuilder_ != null) {
return logIdBuilder_.getMessageOrBuilder();
} else {
return logId_ == null ?
dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : logId_;
}
}
/**
* <pre>
* The unique identifier for this transparency log.
* Represented as the SHA-256 hash of the log's public key,
* calculated over the DER encoding of the key represented as
* SubjectPublicKeyInfo.
* See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
* MUST set checkpoint_key_id if multiple logs use the same
* signing key.
* Deprecated: Use checkpoint_key_id instead, since log_id is not
* guaranteed to be unique across multiple deployments. Clients
* must use the key name and key ID from a checkpoint to determine
* the correct TransparencyLogInstance to verify a proof.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];</code>
*/
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>
internalGetLogIdFieldBuilder() {
if (logIdBuilder_ == null) {
logIdBuilder_ = new com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>(
getLogId(),
getParentForChildren(),
isClean());
logId_ = null;
}
return logIdBuilder_;
}
private dev.sigstore.proto.common.v1.LogId checkpointKeyId_;
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder> checkpointKeyIdBuilder_;
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
* @return Whether the checkpointKeyId field is set.
*/
public boolean hasCheckpointKeyId() {
return ((bitField0_ & 0x00000010) != 0);
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
* @return The checkpointKeyId.
*/
public dev.sigstore.proto.common.v1.LogId getCheckpointKeyId() {
if (checkpointKeyIdBuilder_ == null) {
return checkpointKeyId_ == null ? dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
} else {
return checkpointKeyIdBuilder_.getMessage();
}
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public Builder setCheckpointKeyId(dev.sigstore.proto.common.v1.LogId value) {
if (checkpointKeyIdBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
checkpointKeyId_ = value;
} else {
checkpointKeyIdBuilder_.setMessage(value);
}
bitField0_ |= 0x00000010;
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public Builder setCheckpointKeyId(
dev.sigstore.proto.common.v1.LogId.Builder builderForValue) {
if (checkpointKeyIdBuilder_ == null) {
checkpointKeyId_ = builderForValue.build();
} else {
checkpointKeyIdBuilder_.setMessage(builderForValue.build());
}
bitField0_ |= 0x00000010;
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public Builder mergeCheckpointKeyId(dev.sigstore.proto.common.v1.LogId value) {
if (checkpointKeyIdBuilder_ == null) {
if (((bitField0_ & 0x00000010) != 0) &&
checkpointKeyId_ != null &&
checkpointKeyId_ != dev.sigstore.proto.common.v1.LogId.getDefaultInstance()) {
getCheckpointKeyIdBuilder().mergeFrom(value);
} else {
checkpointKeyId_ = value;
}
} else {
checkpointKeyIdBuilder_.mergeFrom(value);
}
if (checkpointKeyId_ != null) {
bitField0_ |= 0x00000010;
onChanged();
}
return this;
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public Builder clearCheckpointKeyId() {
bitField0_ = (bitField0_ & ~0x00000010);
checkpointKeyId_ = null;
if (checkpointKeyIdBuilder_ != null) {
checkpointKeyIdBuilder_.dispose();
checkpointKeyIdBuilder_ = null;
}
onChanged();
return this;
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public dev.sigstore.proto.common.v1.LogId.Builder getCheckpointKeyIdBuilder() {
bitField0_ |= 0x00000010;
onChanged();
return internalGetCheckpointKeyIdFieldBuilder().getBuilder();
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
public dev.sigstore.proto.common.v1.LogIdOrBuilder getCheckpointKeyIdOrBuilder() {
if (checkpointKeyIdBuilder_ != null) {
return checkpointKeyIdBuilder_.getMessageOrBuilder();
} else {
return checkpointKeyId_ == null ?
dev.sigstore.proto.common.v1.LogId.getDefaultInstance() : checkpointKeyId_;
}
}
/**
* <pre>
* The unique identifier for the log, used in the checkpoint.
* Its calculation is described in
* https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
* SHOULD be set for all logs. When not set, clients MUST use log_id.
*
* For Ed25519 signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
* For ECDSA signatures, the key ID is computed per the C2SP spec:
* key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
* For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
* "PKIX-RSA-PKCS#1v1.5":
* key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
*
* This is provided for convenience. Clients can also calculate the
* checkpoint key ID given the log's public key.
* SHOULD be 4 bytes long, as a truncated hash.
*
* To find a matching TransparencyLogInstance in the TrustedRoot,
* clients will parse the checkpoint, and for each signature line,
* use the key name (i.e. log origin, base_url from TrustedRoot)
* and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
* which can then be compared against the TrustedRoot log instances.
* </pre>
*
* <code>.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;</code>
*/
private com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>
internalGetCheckpointKeyIdFieldBuilder() {
if (checkpointKeyIdBuilder_ == null) {
checkpointKeyIdBuilder_ = new com.google.protobuf.SingleFieldBuilder<
dev.sigstore.proto.common.v1.LogId, dev.sigstore.proto.common.v1.LogId.Builder, dev.sigstore.proto.common.v1.LogIdOrBuilder>(
getCheckpointKeyId(),
getParentForChildren(),
isClean());
checkpointKeyId_ = null;
}
return checkpointKeyIdBuilder_;
}
private java.lang.Object operator_ = "";
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @return The operator.
*/
public java.lang.String getOperator() {
java.lang.Object ref = operator_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs =
(com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
operator_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @return The bytes for operator.
*/
public com.google.protobuf.ByteString
getOperatorBytes() {
java.lang.Object ref = operator_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8(
(java.lang.String) ref);
operator_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @param value The operator to set.
* @return This builder for chaining.
*/
public Builder setOperator(
java.lang.String value) {
if (value == null) { throw new NullPointerException(); }
operator_ = value;
bitField0_ |= 0x00000020;
onChanged();
return this;
}
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @return This builder for chaining.
*/
public Builder clearOperator() {
operator_ = getDefaultInstance().getOperator();
bitField0_ = (bitField0_ & ~0x00000020);
onChanged();
return this;
}
/**
* <pre>
* The name of the operator of this log deployment. Operator MUST be
* formatted as a scheme-less URI, e.g. sigstore.dev
* This MUST be used when there are multiple transparency log instances
* to determine if log proof verification meets a specified threshold,
* e.g. two proofs from log deployments operated by the same operator
* should count as only one valid proof.
* </pre>
*
* <code>string operator = 6;</code>
* @param value The bytes for operator to set.
* @return This builder for chaining.
*/
public Builder setOperatorBytes(
com.google.protobuf.ByteString value) {
if (value == null) { throw new NullPointerException(); }
checkByteStringIsUtf8(value);
operator_ = value;
bitField0_ |= 0x00000020;
onChanged();
return this;
}
// @@protoc_insertion_point(builder_scope:dev.sigstore.trustroot.v1.TransparencyLogInstance)
}
// @@protoc_insertion_point(class_scope:dev.sigstore.trustroot.v1.TransparencyLogInstance)
private static final dev.sigstore.proto.trustroot.v1.TransparencyLogInstance DEFAULT_INSTANCE;
static {
DEFAULT_INSTANCE = new dev.sigstore.proto.trustroot.v1.TransparencyLogInstance();
}
public static dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static final com.google.protobuf.Parser<TransparencyLogInstance>
PARSER = new com.google.protobuf.AbstractParser<TransparencyLogInstance>() {
@java.lang.Override
public TransparencyLogInstance parsePartialFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
Builder builder = newBuilder();
try {
builder.mergeFrom(input, extensionRegistry);
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.setUnfinishedMessage(builder.buildPartial());
} catch (com.google.protobuf.UninitializedMessageException e) {
throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
} catch (java.io.IOException e) {
throw new com.google.protobuf.InvalidProtocolBufferException(e)
.setUnfinishedMessage(builder.buildPartial());
}
return builder.buildPartial();
}
};
public static com.google.protobuf.Parser<TransparencyLogInstance> parser() {
return PARSER;
}
@java.lang.Override
public com.google.protobuf.Parser<TransparencyLogInstance> getParserForType() {
return PARSER;
}
@java.lang.Override
public dev.sigstore.proto.trustroot.v1.TransparencyLogInstance getDefaultInstanceForType() {
return DEFAULT_INSTANCE;
}
}