Package dev.sigstore.proto.trustroot.v1
Class SigningConfig.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<BuilderT>
com.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
dev.sigstore.proto.trustroot.v1.SigningConfig.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,SigningConfigOrBuilder
,Cloneable
- Enclosing class:
- SigningConfig
public static final class SigningConfig.Builder
extends com.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
implements SigningConfigOrBuilder
SigningConfig represents the trusted entities/state needed by Sigstore signing. In particular, it primarily contains service URLs that a Sigstore signer may need to connect to for the online aspects of signing.Protobuf type
dev.sigstore.trustroot.v1.SigningConfig
-
Method Summary
Modifier and TypeMethodDescriptionaddAllCaUrls
(Iterable<? extends Service> values) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.addAllOidcUrls
(Iterable<? extends Service> values) URLs to OpenID Connect identity providers.addAllRekorTlogUrls
(Iterable<? extends Service> values) URLs to Rekor transparency logs.addAllTsaUrls
(Iterable<? extends Service> values) URLs to RFC 3161 Time Stamping Authorities (TSA).URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.addCaUrls
(int index, Service.Builder builderForValue) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.addCaUrls
(Service.Builder builderForValue) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.addCaUrlsBuilder
(int index) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.addOidcUrls
(int index, Service value) URLs to OpenID Connect identity providers.addOidcUrls
(int index, Service.Builder builderForValue) URLs to OpenID Connect identity providers.addOidcUrls
(Service value) URLs to OpenID Connect identity providers.addOidcUrls
(Service.Builder builderForValue) URLs to OpenID Connect identity providers.URLs to OpenID Connect identity providers.addOidcUrlsBuilder
(int index) URLs to OpenID Connect identity providers.addRekorTlogUrls
(int index, Service value) URLs to Rekor transparency logs.addRekorTlogUrls
(int index, Service.Builder builderForValue) URLs to Rekor transparency logs.addRekorTlogUrls
(Service value) URLs to Rekor transparency logs.addRekorTlogUrls
(Service.Builder builderForValue) URLs to Rekor transparency logs.URLs to Rekor transparency logs.addRekorTlogUrlsBuilder
(int index) URLs to Rekor transparency logs.addTsaUrls
(int index, Service value) URLs to RFC 3161 Time Stamping Authorities (TSA).addTsaUrls
(int index, Service.Builder builderForValue) URLs to RFC 3161 Time Stamping Authorities (TSA).addTsaUrls
(Service value) URLs to RFC 3161 Time Stamping Authorities (TSA).addTsaUrls
(Service.Builder builderForValue) URLs to RFC 3161 Time Stamping Authorities (TSA).URLs to RFC 3161 Time Stamping Authorities (TSA).addTsaUrlsBuilder
(int index) URLs to RFC 3161 Time Stamping Authorities (TSA).build()
clear()
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+jsonURLs to OpenID Connect identity providers.Specifies how a client should select the set of Rekor transparency logs to write to.URLs to Rekor transparency logs.Specifies how a client should select the set of TSAs to request signed timestamps from.URLs to RFC 3161 Time Stamping Authorities (TSA).getCaUrls
(int index) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.getCaUrlsBuilder
(int index) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.int
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.getCaUrlsOrBuilder
(int index) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.List<? extends ServiceOrBuilder>
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Descriptors.Descriptor
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+jsoncom.google.protobuf.ByteString
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+jsongetOidcUrls
(int index) URLs to OpenID Connect identity providers.getOidcUrlsBuilder
(int index) URLs to OpenID Connect identity providers.URLs to OpenID Connect identity providers.int
URLs to OpenID Connect identity providers.URLs to OpenID Connect identity providers.getOidcUrlsOrBuilder
(int index) URLs to OpenID Connect identity providers.List<? extends ServiceOrBuilder>
URLs to OpenID Connect identity providers.Specifies how a client should select the set of Rekor transparency logs to write to.Specifies how a client should select the set of Rekor transparency logs to write to.Specifies how a client should select the set of Rekor transparency logs to write to.getRekorTlogUrls
(int index) URLs to Rekor transparency logs.getRekorTlogUrlsBuilder
(int index) URLs to Rekor transparency logs.URLs to Rekor transparency logs.int
URLs to Rekor transparency logs.URLs to Rekor transparency logs.getRekorTlogUrlsOrBuilder
(int index) URLs to Rekor transparency logs.List<? extends ServiceOrBuilder>
URLs to Rekor transparency logs.Specifies how a client should select the set of TSAs to request signed timestamps from.Specifies how a client should select the set of TSAs to request signed timestamps from.Specifies how a client should select the set of TSAs to request signed timestamps from.getTsaUrls
(int index) URLs to RFC 3161 Time Stamping Authorities (TSA).getTsaUrlsBuilder
(int index) URLs to RFC 3161 Time Stamping Authorities (TSA).URLs to RFC 3161 Time Stamping Authorities (TSA).int
URLs to RFC 3161 Time Stamping Authorities (TSA).URLs to RFC 3161 Time Stamping Authorities (TSA).getTsaUrlsOrBuilder
(int index) URLs to RFC 3161 Time Stamping Authorities (TSA).List<? extends ServiceOrBuilder>
URLs to RFC 3161 Time Stamping Authorities (TSA).boolean
Specifies how a client should select the set of Rekor transparency logs to write to.boolean
Specifies how a client should select the set of TSAs to request signed timestamps from.protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
final boolean
mergeFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom
(com.google.protobuf.Message other) mergeFrom
(SigningConfig other) Specifies how a client should select the set of Rekor transparency logs to write to.Specifies how a client should select the set of TSAs to request signed timestamps from.removeCaUrls
(int index) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.removeOidcUrls
(int index) URLs to OpenID Connect identity providers.removeRekorTlogUrls
(int index) URLs to Rekor transparency logs.removeTsaUrls
(int index) URLs to RFC 3161 Time Stamping Authorities (TSA).URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.setCaUrls
(int index, Service.Builder builderForValue) URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates.setMediaType
(String value) MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+jsonsetMediaTypeBytes
(com.google.protobuf.ByteString value) MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+jsonsetOidcUrls
(int index, Service value) URLs to OpenID Connect identity providers.setOidcUrls
(int index, Service.Builder builderForValue) URLs to OpenID Connect identity providers.Specifies how a client should select the set of Rekor transparency logs to write to.setRekorTlogConfig
(ServiceConfiguration.Builder builderForValue) Specifies how a client should select the set of Rekor transparency logs to write to.setRekorTlogUrls
(int index, Service value) URLs to Rekor transparency logs.setRekorTlogUrls
(int index, Service.Builder builderForValue) URLs to Rekor transparency logs.setTsaConfig
(ServiceConfiguration value) Specifies how a client should select the set of TSAs to request signed timestamps from.setTsaConfig
(ServiceConfiguration.Builder builderForValue) Specifies how a client should select the set of TSAs to request signed timestamps from.setTsaUrls
(int index, Service value) URLs to RFC 3161 Time Stamping Authorities (TSA).setTsaUrls
(int index, Service.Builder builderForValue) URLs to RFC 3161 Time Stamping Authorities (TSA).Methods inherited from class com.google.protobuf.GeneratedMessage.Builder
addRepeatedField, clearField, clearOneof, clone, getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMapFieldReflection, internalGetMutableMapField, internalGetMutableMapFieldReflection, isClean, markClean, mergeUnknownFields, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setField, setRepeatedField, setUnknownFields, setUnknownFieldSetBuilder, setUnknownFieldsProto3
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFrom
Methods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFrom
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
-
clear
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
mergeFrom
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<SigningConfig.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessage.Builder<SigningConfig.Builder>
-
mergeFrom
public SigningConfig.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<SigningConfig.Builder>
- Throws:
IOException
-
getMediaType
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+json
string media_type = 5;
- Specified by:
getMediaType
in interfaceSigningConfigOrBuilder
- Returns:
- The mediaType.
-
getMediaTypeBytes
public com.google.protobuf.ByteString getMediaTypeBytes()MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+json
string media_type = 5;
- Specified by:
getMediaTypeBytes
in interfaceSigningConfigOrBuilder
- Returns:
- The bytes for mediaType.
-
setMediaType
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+json
string media_type = 5;
- Parameters:
value
- The mediaType to set.- Returns:
- This builder for chaining.
-
clearMediaType
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+json
string media_type = 5;
- Returns:
- This builder for chaining.
-
setMediaTypeBytes
MUST be application/vnd.dev.sigstore.signingconfig.v0.2+json Clients MAY choose to also support application/vnd.dev.sigstore.signingconfig.v0.1+json
string media_type = 5;
- Parameters:
value
- The bytes for mediaType to set.- Returns:
- This builder for chaining.
-
getCaUrlsList
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
- Specified by:
getCaUrlsList
in interfaceSigningConfigOrBuilder
-
getCaUrlsCount
public int getCaUrlsCount()URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
- Specified by:
getCaUrlsCount
in interfaceSigningConfigOrBuilder
-
getCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
- Specified by:
getCaUrls
in interfaceSigningConfigOrBuilder
-
setCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
setCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addAllCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
clearCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
removeCaUrls
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
getCaUrlsBuilder
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
getCaUrlsOrBuilder
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
- Specified by:
getCaUrlsOrBuilder
in interfaceSigningConfigOrBuilder
-
getCaUrlsOrBuilderList
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
- Specified by:
getCaUrlsOrBuilderList
in interfaceSigningConfigOrBuilder
-
addCaUrlsBuilder
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
addCaUrlsBuilder
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
getCaUrlsBuilderList
URLs to Fulcio-compatible CAs, capable of receiving Certificate Signing Requests (CSRs) and responding with issued certificates. These URLs MUST be the "base" URL for the CAs, which clients should construct an appropriate CSR endpoint on top of. For example, if a CA URL is `https://example.com/ca`, then the client MAY construct the CSR endpoint as `https://example.com/ca/api/v2/signingCert`. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service ca_urls = 6;
-
getOidcUrlsList
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
- Specified by:
getOidcUrlsList
in interfaceSigningConfigOrBuilder
-
getOidcUrlsCount
public int getOidcUrlsCount()URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
- Specified by:
getOidcUrlsCount
in interfaceSigningConfigOrBuilder
-
getOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
- Specified by:
getOidcUrls
in interfaceSigningConfigOrBuilder
-
setOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
setOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addAllOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
clearOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
removeOidcUrls
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
getOidcUrlsBuilder
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
getOidcUrlsOrBuilder
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
- Specified by:
getOidcUrlsOrBuilder
in interfaceSigningConfigOrBuilder
-
getOidcUrlsOrBuilderList
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
- Specified by:
getOidcUrlsOrBuilderList
in interfaceSigningConfigOrBuilder
-
addOidcUrlsBuilder
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
addOidcUrlsBuilder
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
getOidcUrlsBuilderList
URLs to OpenID Connect identity providers. These URLs MUST be the "base" URLs for the OIDC IdPs, which clients should perform well-known OpenID Connect discovery against. Clients MUST select only one Service with the highest API version that the client is compatible with, that is within its validity period, and has the newest validity start date. Client SHOULD select the first Service that meets this requirement. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first.
repeated .dev.sigstore.trustroot.v1.Service oidc_urls = 7;
-
getRekorTlogUrlsList
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
- Specified by:
getRekorTlogUrlsList
in interfaceSigningConfigOrBuilder
-
getRekorTlogUrlsCount
public int getRekorTlogUrlsCount()URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
- Specified by:
getRekorTlogUrlsCount
in interfaceSigningConfigOrBuilder
-
getRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
- Specified by:
getRekorTlogUrls
in interfaceSigningConfigOrBuilder
-
setRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
setRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addAllRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
clearRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
removeRekorTlogUrls
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
getRekorTlogUrlsBuilder
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
getRekorTlogUrlsOrBuilder
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
- Specified by:
getRekorTlogUrlsOrBuilder
in interfaceSigningConfigOrBuilder
-
getRekorTlogUrlsOrBuilderList
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
- Specified by:
getRekorTlogUrlsOrBuilderList
in interfaceSigningConfigOrBuilder
-
addRekorTlogUrlsBuilder
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
addRekorTlogUrlsBuilder
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
getRekorTlogUrlsBuilderList
URLs to Rekor transparency logs. These URL MUST be the "base" URLs for the transparency logs, which clients should construct appropriate API endpoints on top of. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `rekor_tlog_config`.
repeated .dev.sigstore.trustroot.v1.Service rekor_tlog_urls = 8;
-
hasRekorTlogConfig
public boolean hasRekorTlogConfig()Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
- Specified by:
hasRekorTlogConfig
in interfaceSigningConfigOrBuilder
- Returns:
- Whether the rekorTlogConfig field is set.
-
getRekorTlogConfig
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
- Specified by:
getRekorTlogConfig
in interfaceSigningConfigOrBuilder
- Returns:
- The rekorTlogConfig.
-
setRekorTlogConfig
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
-
setRekorTlogConfig
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
-
mergeRekorTlogConfig
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
-
clearRekorTlogConfig
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
-
getRekorTlogConfigBuilder
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
-
getRekorTlogConfigOrBuilder
Specifies how a client should select the set of Rekor transparency logs to write to.
.dev.sigstore.trustroot.v1.ServiceConfiguration rekor_tlog_config = 9;
- Specified by:
getRekorTlogConfigOrBuilder
in interfaceSigningConfigOrBuilder
-
getTsaUrlsList
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
- Specified by:
getTsaUrlsList
in interfaceSigningConfigOrBuilder
-
getTsaUrlsCount
public int getTsaUrlsCount()URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
- Specified by:
getTsaUrlsCount
in interfaceSigningConfigOrBuilder
-
getTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
- Specified by:
getTsaUrls
in interfaceSigningConfigOrBuilder
-
setTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
setTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addAllTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
clearTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
removeTsaUrls
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
getTsaUrlsBuilder
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
getTsaUrlsOrBuilder
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
- Specified by:
getTsaUrlsOrBuilder
in interfaceSigningConfigOrBuilder
-
getTsaUrlsOrBuilderList
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
- Specified by:
getTsaUrlsOrBuilderList
in interfaceSigningConfigOrBuilder
-
addTsaUrlsBuilder
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
addTsaUrlsBuilder
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
getTsaUrlsBuilderList
URLs to RFC 3161 Time Stamping Authorities (TSA). These URLs MUST be the *full* URL for the TSA, meaning that it should be suitable for submitting Time Stamp Requests (TSRs) to via HTTP, per RFC 3161. Clients MUST group Services by `operator` and select at most one Service from each operator. Clients MUST select Services with the highest API version that the client is compatible with, that are within its validity period, and have the newest validity start dates. All listed Services SHOULD be sorted by the `valid_for` window in descending order, with the newest instance first. Clients MUST select Services based on the selector value of `tsa_config`.
repeated .dev.sigstore.trustroot.v1.Service tsa_urls = 10;
-
hasTsaConfig
public boolean hasTsaConfig()Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
- Specified by:
hasTsaConfig
in interfaceSigningConfigOrBuilder
- Returns:
- Whether the tsaConfig field is set.
-
getTsaConfig
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
- Specified by:
getTsaConfig
in interfaceSigningConfigOrBuilder
- Returns:
- The tsaConfig.
-
setTsaConfig
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
-
setTsaConfig
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
-
mergeTsaConfig
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
-
clearTsaConfig
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
-
getTsaConfigBuilder
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
-
getTsaConfigOrBuilder
Specifies how a client should select the set of TSAs to request signed timestamps from.
.dev.sigstore.trustroot.v1.ServiceConfiguration tsa_config = 11;
- Specified by:
getTsaConfigOrBuilder
in interfaceSigningConfigOrBuilder
-