Package dev.sigstore.proto.trustroot.v1
Class TransparencyLogInstance.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<BuilderT>
com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,TransparencyLogInstanceOrBuilder
,Cloneable
- Enclosing class:
- TransparencyLogInstance
public static final class TransparencyLogInstance.Builder
extends com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
implements TransparencyLogInstanceOrBuilder
TransparencyLogInstance describes the immutable parameters from a transparency log. See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters for more details. The included parameters are the minimal set required to identify a log, and verify an inclusion proof/promise.Protobuf type
dev.sigstore.trustroot.v1.TransparencyLogInstance
-
Method Summary
Modifier and TypeMethodDescriptionbuild()
clear()
The base URL at which can be used to URLs for the client.The unique identifier for the log, used in the checkpoint.The hash algorithm used for the Merkle Tree.Deprecated.The name of the operator of this log deployment.The public key used to verify signatures generated by the log.The base URL at which can be used to URLs for the client.com.google.protobuf.ByteString
The base URL at which can be used to URLs for the client.The unique identifier for the log, used in the checkpoint.The unique identifier for the log, used in the checkpoint.The unique identifier for the log, used in the checkpoint.static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Descriptors.Descriptor
The hash algorithm used for the Merkle Tree.int
The hash algorithm used for the Merkle Tree.getLogId()
Deprecated.dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.Deprecated.Deprecated.The name of the operator of this log deployment.com.google.protobuf.ByteString
The name of the operator of this log deployment.The public key used to verify signatures generated by the log.The public key used to verify signatures generated by the log.The public key used to verify signatures generated by the log.boolean
The unique identifier for the log, used in the checkpoint.boolean
hasLogId()
Deprecated.dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated.boolean
The public key used to verify signatures generated by the log.protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
final boolean
mergeCheckpointKeyId
(LogId value) The unique identifier for the log, used in the checkpoint.mergeFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom
(com.google.protobuf.Message other) mergeFrom
(TransparencyLogInstance other) mergeLogId
(LogId value) Deprecated.mergePublicKey
(PublicKey value) The public key used to verify signatures generated by the log.setBaseUrl
(String value) The base URL at which can be used to URLs for the client.setBaseUrlBytes
(com.google.protobuf.ByteString value) The base URL at which can be used to URLs for the client.setCheckpointKeyId
(LogId value) The unique identifier for the log, used in the checkpoint.setCheckpointKeyId
(LogId.Builder builderForValue) The unique identifier for the log, used in the checkpoint.setHashAlgorithm
(HashAlgorithm value) The hash algorithm used for the Merkle Tree.setHashAlgorithmValue
(int value) The hash algorithm used for the Merkle Tree.Deprecated.setLogId
(LogId.Builder builderForValue) Deprecated.setOperator
(String value) The name of the operator of this log deployment.setOperatorBytes
(com.google.protobuf.ByteString value) The name of the operator of this log deployment.setPublicKey
(PublicKey value) The public key used to verify signatures generated by the log.setPublicKey
(PublicKey.Builder builderForValue) The public key used to verify signatures generated by the log.Methods inherited from class com.google.protobuf.GeneratedMessage.Builder
addRepeatedField, clearField, clearOneof, clone, getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMapFieldReflection, internalGetMutableMapField, internalGetMutableMapFieldReflection, isClean, markClean, mergeUnknownFields, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setField, setRepeatedField, setUnknownFields, setUnknownFieldSetBuilder, setUnknownFieldsProto3
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFrom
Methods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFrom
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
-
clear
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
mergeFrom
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<TransparencyLogInstance.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
-
mergeFrom
public TransparencyLogInstance.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<TransparencyLogInstance.Builder>
- Throws:
IOException
-
getBaseUrl
The base URL at which can be used to URLs for the client. SHOULD match the origin on the log checkpoint: https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
string base_url = 1;
- Specified by:
getBaseUrl
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The baseUrl.
-
getBaseUrlBytes
public com.google.protobuf.ByteString getBaseUrlBytes()The base URL at which can be used to URLs for the client. SHOULD match the origin on the log checkpoint: https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
string base_url = 1;
- Specified by:
getBaseUrlBytes
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The bytes for baseUrl.
-
setBaseUrl
The base URL at which can be used to URLs for the client. SHOULD match the origin on the log checkpoint: https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
string base_url = 1;
- Parameters:
value
- The baseUrl to set.- Returns:
- This builder for chaining.
-
clearBaseUrl
The base URL at which can be used to URLs for the client. SHOULD match the origin on the log checkpoint: https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
string base_url = 1;
- Returns:
- This builder for chaining.
-
setBaseUrlBytes
The base URL at which can be used to URLs for the client. SHOULD match the origin on the log checkpoint: https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
string base_url = 1;
- Parameters:
value
- The bytes for baseUrl to set.- Returns:
- This builder for chaining.
-
getHashAlgorithmValue
public int getHashAlgorithmValue()The hash algorithm used for the Merkle Tree.
.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
- Specified by:
getHashAlgorithmValue
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The enum numeric value on the wire for hashAlgorithm.
-
setHashAlgorithmValue
The hash algorithm used for the Merkle Tree.
.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
- Parameters:
value
- The enum numeric value on the wire for hashAlgorithm to set.- Returns:
- This builder for chaining.
-
getHashAlgorithm
The hash algorithm used for the Merkle Tree.
.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
- Specified by:
getHashAlgorithm
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The hashAlgorithm.
-
setHashAlgorithm
The hash algorithm used for the Merkle Tree.
.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
- Parameters:
value
- The hashAlgorithm to set.- Returns:
- This builder for chaining.
-
clearHashAlgorithm
The hash algorithm used for the Merkle Tree.
.dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
- Returns:
- This builder for chaining.
-
hasPublicKey
public boolean hasPublicKey()The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
- Specified by:
hasPublicKey
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- Whether the publicKey field is set.
-
getPublicKey
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
- Specified by:
getPublicKey
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The publicKey.
-
setPublicKey
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
-
setPublicKey
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
-
mergePublicKey
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
-
clearPublicKey
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
-
getPublicKeyBuilder
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
-
getPublicKeyOrBuilder
The public key used to verify signatures generated by the log. This attribute contains the signature algorithm used by the log.
.dev.sigstore.common.v1.PublicKey public_key = 3;
- Specified by:
getPublicKeyOrBuilder
in interfaceTransparencyLogInstanceOrBuilder
-
hasLogId
Deprecated.dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated. See sigstore_trustroot.proto;l=53The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
- Specified by:
hasLogId
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- Whether the logId field is set.
-
getLogId
Deprecated.dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated. See sigstore_trustroot.proto;l=53The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
- Specified by:
getLogId
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The logId.
-
setLogId
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
-
setLogId
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
-
mergeLogId
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
-
clearLogId
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
-
getLogIdBuilder
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
-
getLogIdOrBuilder
Deprecated.The unique identifier for this transparency log. Represented as the SHA-256 hash of the log's public key, calculated over the DER encoding of the key represented as SubjectPublicKeyInfo. See https://www.rfc-editor.org/rfc/rfc6962#section-3.2 MUST set checkpoint_key_id if multiple logs use the same signing key. Deprecated: Use checkpoint_key_id instead, since log_id is not guaranteed to be unique across multiple deployments. Clients must use the key name and key ID from a checkpoint to determine the correct TransparencyLogInstance to verify a proof.
.dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
- Specified by:
getLogIdOrBuilder
in interfaceTransparencyLogInstanceOrBuilder
-
hasCheckpointKeyId
public boolean hasCheckpointKeyId()The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
- Specified by:
hasCheckpointKeyId
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- Whether the checkpointKeyId field is set.
-
getCheckpointKeyId
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
- Specified by:
getCheckpointKeyId
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The checkpointKeyId.
-
setCheckpointKeyId
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
-
setCheckpointKeyId
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
-
mergeCheckpointKeyId
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
-
clearCheckpointKeyId
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
-
getCheckpointKeyIdBuilder
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
-
getCheckpointKeyIdOrBuilder
The unique identifier for the log, used in the checkpoint. Its calculation is described in https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures SHOULD be set for all logs. When not set, clients MUST use log_id. For Ed25519 signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4] For ECDSA signatures, the key ID is computed per the C2SP spec: key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4] For RSA signatures, the signature type will be 0xff with an appended identifier for the format, "PKIX-RSA-PKCS#1v1.5": key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4] This is provided for convenience. Clients can also calculate the checkpoint key ID given the log's public key. SHOULD be 4 bytes long, as a truncated hash. To find a matching TransparencyLogInstance in the TrustedRoot, clients will parse the checkpoint, and for each signature line, use the key name (i.e. log origin, base_url from TrustedRoot) and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot) which can then be compared against the TrustedRoot log instances.
.dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
- Specified by:
getCheckpointKeyIdOrBuilder
in interfaceTransparencyLogInstanceOrBuilder
-
getOperator
The name of the operator of this log deployment. Operator MUST be formatted as a scheme-less URI, e.g. sigstore.dev This MUST be used when there are multiple transparency log instances to determine if log proof verification meets a specified threshold, e.g. two proofs from log deployments operated by the same operator should count as only one valid proof.
string operator = 6;
- Specified by:
getOperator
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The operator.
-
getOperatorBytes
public com.google.protobuf.ByteString getOperatorBytes()The name of the operator of this log deployment. Operator MUST be formatted as a scheme-less URI, e.g. sigstore.dev This MUST be used when there are multiple transparency log instances to determine if log proof verification meets a specified threshold, e.g. two proofs from log deployments operated by the same operator should count as only one valid proof.
string operator = 6;
- Specified by:
getOperatorBytes
in interfaceTransparencyLogInstanceOrBuilder
- Returns:
- The bytes for operator.
-
setOperator
The name of the operator of this log deployment. Operator MUST be formatted as a scheme-less URI, e.g. sigstore.dev This MUST be used when there are multiple transparency log instances to determine if log proof verification meets a specified threshold, e.g. two proofs from log deployments operated by the same operator should count as only one valid proof.
string operator = 6;
- Parameters:
value
- The operator to set.- Returns:
- This builder for chaining.
-
clearOperator
The name of the operator of this log deployment. Operator MUST be formatted as a scheme-less URI, e.g. sigstore.dev This MUST be used when there are multiple transparency log instances to determine if log proof verification meets a specified threshold, e.g. two proofs from log deployments operated by the same operator should count as only one valid proof.
string operator = 6;
- Returns:
- This builder for chaining.
-
setOperatorBytes
The name of the operator of this log deployment. Operator MUST be formatted as a scheme-less URI, e.g. sigstore.dev This MUST be used when there are multiple transparency log instances to determine if log proof verification meets a specified threshold, e.g. two proofs from log deployments operated by the same operator should count as only one valid proof.
string operator = 6;
- Parameters:
value
- The bytes for operator to set.- Returns:
- This builder for chaining.
-