Class TransparencyLogInstance.Builder

java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<BuilderT>
com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
dev.sigstore.proto.trustroot.v1.TransparencyLogInstance.Builder
All Implemented Interfaces:
com.google.protobuf.Message.Builder, com.google.protobuf.MessageLite.Builder, com.google.protobuf.MessageLiteOrBuilder, com.google.protobuf.MessageOrBuilder, TransparencyLogInstanceOrBuilder, Cloneable
Enclosing class:
TransparencyLogInstance

public static final class TransparencyLogInstance.Builder extends com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder> implements TransparencyLogInstanceOrBuilder
 TransparencyLogInstance describes the immutable parameters from a
 transparency log.
 See https://www.rfc-editor.org/rfc/rfc9162.html#name-log-parameters
 for more details.
 The included parameters are the minimal set required to identify a log,
 and verify an inclusion proof/promise.
 
Protobuf type dev.sigstore.trustroot.v1.TransparencyLogInstance
  • Method Details

    • getDescriptor

      public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
    • internalGetFieldAccessorTable

      protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()
      Specified by:
      internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
    • clear

      Specified by:
      clear in interface com.google.protobuf.Message.Builder
      Specified by:
      clear in interface com.google.protobuf.MessageLite.Builder
      Overrides:
      clear in class com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
    • getDescriptorForType

      public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
      Specified by:
      getDescriptorForType in interface com.google.protobuf.Message.Builder
      Specified by:
      getDescriptorForType in interface com.google.protobuf.MessageOrBuilder
      Overrides:
      getDescriptorForType in class com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
    • getDefaultInstanceForType

      public TransparencyLogInstance getDefaultInstanceForType()
      Specified by:
      getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuilder
      Specified by:
      getDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilder
    • build

      public TransparencyLogInstance build()
      Specified by:
      build in interface com.google.protobuf.Message.Builder
      Specified by:
      build in interface com.google.protobuf.MessageLite.Builder
    • buildPartial

      public TransparencyLogInstance buildPartial()
      Specified by:
      buildPartial in interface com.google.protobuf.Message.Builder
      Specified by:
      buildPartial in interface com.google.protobuf.MessageLite.Builder
    • mergeFrom

      public TransparencyLogInstance.Builder mergeFrom(com.google.protobuf.Message other)
      Specified by:
      mergeFrom in interface com.google.protobuf.Message.Builder
      Overrides:
      mergeFrom in class com.google.protobuf.AbstractMessage.Builder<TransparencyLogInstance.Builder>
    • mergeFrom

    • isInitialized

      public final boolean isInitialized()
      Specified by:
      isInitialized in interface com.google.protobuf.MessageLiteOrBuilder
      Overrides:
      isInitialized in class com.google.protobuf.GeneratedMessage.Builder<TransparencyLogInstance.Builder>
    • mergeFrom

      public TransparencyLogInstance.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
      Specified by:
      mergeFrom in interface com.google.protobuf.Message.Builder
      Specified by:
      mergeFrom in interface com.google.protobuf.MessageLite.Builder
      Overrides:
      mergeFrom in class com.google.protobuf.AbstractMessage.Builder<TransparencyLogInstance.Builder>
      Throws:
      IOException
    • getBaseUrl

      public String getBaseUrl()
       The base URL at which can be used to URLs for the client.
       SHOULD match the origin on the log checkpoint:
       https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
       
      string base_url = 1;
      Specified by:
      getBaseUrl in interface TransparencyLogInstanceOrBuilder
      Returns:
      The baseUrl.
    • getBaseUrlBytes

      public com.google.protobuf.ByteString getBaseUrlBytes()
       The base URL at which can be used to URLs for the client.
       SHOULD match the origin on the log checkpoint:
       https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
       
      string base_url = 1;
      Specified by:
      getBaseUrlBytes in interface TransparencyLogInstanceOrBuilder
      Returns:
      The bytes for baseUrl.
    • setBaseUrl

      public TransparencyLogInstance.Builder setBaseUrl(String value)
       The base URL at which can be used to URLs for the client.
       SHOULD match the origin on the log checkpoint:
       https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
       
      string base_url = 1;
      Parameters:
      value - The baseUrl to set.
      Returns:
      This builder for chaining.
    • clearBaseUrl

      public TransparencyLogInstance.Builder clearBaseUrl()
       The base URL at which can be used to URLs for the client.
       SHOULD match the origin on the log checkpoint:
       https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
       
      string base_url = 1;
      Returns:
      This builder for chaining.
    • setBaseUrlBytes

      public TransparencyLogInstance.Builder setBaseUrlBytes(com.google.protobuf.ByteString value)
       The base URL at which can be used to URLs for the client.
       SHOULD match the origin on the log checkpoint:
       https://github.com/C2SP/C2SP/blob/main/tlog-checkpoint.md#note-text.
       
      string base_url = 1;
      Parameters:
      value - The bytes for baseUrl to set.
      Returns:
      This builder for chaining.
    • getHashAlgorithmValue

      public int getHashAlgorithmValue()
       The hash algorithm used for the Merkle Tree.
       
      .dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
      Specified by:
      getHashAlgorithmValue in interface TransparencyLogInstanceOrBuilder
      Returns:
      The enum numeric value on the wire for hashAlgorithm.
    • setHashAlgorithmValue

      public TransparencyLogInstance.Builder setHashAlgorithmValue(int value)
       The hash algorithm used for the Merkle Tree.
       
      .dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
      Parameters:
      value - The enum numeric value on the wire for hashAlgorithm to set.
      Returns:
      This builder for chaining.
    • getHashAlgorithm

      public HashAlgorithm getHashAlgorithm()
       The hash algorithm used for the Merkle Tree.
       
      .dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
      Specified by:
      getHashAlgorithm in interface TransparencyLogInstanceOrBuilder
      Returns:
      The hashAlgorithm.
    • setHashAlgorithm

      public TransparencyLogInstance.Builder setHashAlgorithm(HashAlgorithm value)
       The hash algorithm used for the Merkle Tree.
       
      .dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
      Parameters:
      value - The hashAlgorithm to set.
      Returns:
      This builder for chaining.
    • clearHashAlgorithm

      public TransparencyLogInstance.Builder clearHashAlgorithm()
       The hash algorithm used for the Merkle Tree.
       
      .dev.sigstore.common.v1.HashAlgorithm hash_algorithm = 2;
      Returns:
      This builder for chaining.
    • hasPublicKey

      public boolean hasPublicKey()
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
      Specified by:
      hasPublicKey in interface TransparencyLogInstanceOrBuilder
      Returns:
      Whether the publicKey field is set.
    • getPublicKey

      public PublicKey getPublicKey()
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
      Specified by:
      getPublicKey in interface TransparencyLogInstanceOrBuilder
      Returns:
      The publicKey.
    • setPublicKey

      public TransparencyLogInstance.Builder setPublicKey(PublicKey value)
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
    • setPublicKey

      public TransparencyLogInstance.Builder setPublicKey(PublicKey.Builder builderForValue)
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
    • mergePublicKey

      public TransparencyLogInstance.Builder mergePublicKey(PublicKey value)
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
    • clearPublicKey

      public TransparencyLogInstance.Builder clearPublicKey()
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
    • getPublicKeyBuilder

      public PublicKey.Builder getPublicKeyBuilder()
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
    • getPublicKeyOrBuilder

      public PublicKeyOrBuilder getPublicKeyOrBuilder()
       The public key used to verify signatures generated by the log.
       This attribute contains the signature algorithm used by the log.
       
      .dev.sigstore.common.v1.PublicKey public_key = 3;
      Specified by:
      getPublicKeyOrBuilder in interface TransparencyLogInstanceOrBuilder
    • hasLogId

      @Deprecated public boolean hasLogId()
      Deprecated.
      dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated. See sigstore_trustroot.proto;l=53
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
      Specified by:
      hasLogId in interface TransparencyLogInstanceOrBuilder
      Returns:
      Whether the logId field is set.
    • getLogId

      @Deprecated public LogId getLogId()
      Deprecated.
      dev.sigstore.trustroot.v1.TransparencyLogInstance.log_id is deprecated. See sigstore_trustroot.proto;l=53
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
      Specified by:
      getLogId in interface TransparencyLogInstanceOrBuilder
      Returns:
      The logId.
    • setLogId

      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
    • setLogId

      @Deprecated public TransparencyLogInstance.Builder setLogId(LogId.Builder builderForValue)
      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
    • mergeLogId

      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
    • clearLogId

      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
    • getLogIdBuilder

      @Deprecated public LogId.Builder getLogIdBuilder()
      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
    • getLogIdOrBuilder

      @Deprecated public LogIdOrBuilder getLogIdOrBuilder()
      Deprecated.
       The unique identifier for this transparency log.
       Represented as the SHA-256 hash of the log's public key,
       calculated over the DER encoding of the key represented as
       SubjectPublicKeyInfo.
       See https://www.rfc-editor.org/rfc/rfc6962#section-3.2
       MUST set checkpoint_key_id if multiple logs use the same
       signing key.
       Deprecated: Use checkpoint_key_id instead, since log_id is not
       guaranteed to be unique across multiple deployments. Clients
       must use the key name and key ID from a checkpoint to determine
       the correct TransparencyLogInstance to verify a proof.
       
      .dev.sigstore.common.v1.LogId log_id = 4 [deprecated = true];
      Specified by:
      getLogIdOrBuilder in interface TransparencyLogInstanceOrBuilder
    • hasCheckpointKeyId

      public boolean hasCheckpointKeyId()
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
      Specified by:
      hasCheckpointKeyId in interface TransparencyLogInstanceOrBuilder
      Returns:
      Whether the checkpointKeyId field is set.
    • getCheckpointKeyId

      public LogId getCheckpointKeyId()
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
      Specified by:
      getCheckpointKeyId in interface TransparencyLogInstanceOrBuilder
      Returns:
      The checkpointKeyId.
    • setCheckpointKeyId

      public TransparencyLogInstance.Builder setCheckpointKeyId(LogId value)
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
    • setCheckpointKeyId

      public TransparencyLogInstance.Builder setCheckpointKeyId(LogId.Builder builderForValue)
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
    • mergeCheckpointKeyId

      public TransparencyLogInstance.Builder mergeCheckpointKeyId(LogId value)
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
    • clearCheckpointKeyId

      public TransparencyLogInstance.Builder clearCheckpointKeyId()
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
    • getCheckpointKeyIdBuilder

      public LogId.Builder getCheckpointKeyIdBuilder()
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
    • getCheckpointKeyIdOrBuilder

      public LogIdOrBuilder getCheckpointKeyIdOrBuilder()
       The unique identifier for the log, used in the checkpoint.
       Its calculation is described in
       https://github.com/C2SP/C2SP/blob/main/signed-note.md#signatures
       SHOULD be set for all logs. When not set, clients MUST use log_id.
      
       For Ed25519 signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(key name || 0x0A || 0x01 || 32-byte Ed25519 public key)[:4]
       For ECDSA signatures, the key ID is computed per the C2SP spec:
       key ID = SHA-256(PKIX ASN.1 DER-encoded public key, in SubjectPublicKeyInfo format)[:4]
       For RSA signatures, the signature type will be 0xff with an appended identifier for the format,
       "PKIX-RSA-PKCS#1v1.5":
       key ID = SHA-256(key name || 0x0A || 0xff || PKIX-RSA-PKCS#1v1.5 || PKIX ASN.1 DER-encoded public key)[:4]
      
       This is provided for convenience. Clients can also calculate the
       checkpoint key ID given the log's public key.
       SHOULD be 4 bytes long, as a truncated hash.
      
       To find a matching TransparencyLogInstance in the TrustedRoot,
       clients will parse the checkpoint, and for each signature line,
       use the key name (i.e. log origin, base_url from TrustedRoot)
       and checkpoint key ID (i.e. checkpoint_key_id from TrustedRoot)
       which can then be compared against the TrustedRoot log instances.
       
      .dev.sigstore.common.v1.LogId checkpoint_key_id = 5;
      Specified by:
      getCheckpointKeyIdOrBuilder in interface TransparencyLogInstanceOrBuilder
    • getOperator

      public String getOperator()
       The name of the operator of this log deployment. Operator MUST be
       formatted as a scheme-less URI, e.g. sigstore.dev
       This MUST be used when there are multiple transparency log instances
       to determine if log proof verification meets a specified threshold,
       e.g. two proofs from log deployments operated by the same operator
       should count as only one valid proof.
       
      string operator = 6;
      Specified by:
      getOperator in interface TransparencyLogInstanceOrBuilder
      Returns:
      The operator.
    • getOperatorBytes

      public com.google.protobuf.ByteString getOperatorBytes()
       The name of the operator of this log deployment. Operator MUST be
       formatted as a scheme-less URI, e.g. sigstore.dev
       This MUST be used when there are multiple transparency log instances
       to determine if log proof verification meets a specified threshold,
       e.g. two proofs from log deployments operated by the same operator
       should count as only one valid proof.
       
      string operator = 6;
      Specified by:
      getOperatorBytes in interface TransparencyLogInstanceOrBuilder
      Returns:
      The bytes for operator.
    • setOperator

      public TransparencyLogInstance.Builder setOperator(String value)
       The name of the operator of this log deployment. Operator MUST be
       formatted as a scheme-less URI, e.g. sigstore.dev
       This MUST be used when there are multiple transparency log instances
       to determine if log proof verification meets a specified threshold,
       e.g. two proofs from log deployments operated by the same operator
       should count as only one valid proof.
       
      string operator = 6;
      Parameters:
      value - The operator to set.
      Returns:
      This builder for chaining.
    • clearOperator

      public TransparencyLogInstance.Builder clearOperator()
       The name of the operator of this log deployment. Operator MUST be
       formatted as a scheme-less URI, e.g. sigstore.dev
       This MUST be used when there are multiple transparency log instances
       to determine if log proof verification meets a specified threshold,
       e.g. two proofs from log deployments operated by the same operator
       should count as only one valid proof.
       
      string operator = 6;
      Returns:
      This builder for chaining.
    • setOperatorBytes

      public TransparencyLogInstance.Builder setOperatorBytes(com.google.protobuf.ByteString value)
       The name of the operator of this log deployment. Operator MUST be
       formatted as a scheme-less URI, e.g. sigstore.dev
       This MUST be used when there are multiple transparency log instances
       to determine if log proof verification meets a specified threshold,
       e.g. two proofs from log deployments operated by the same operator
       should count as only one valid proof.
       
      string operator = 6;
      Parameters:
      value - The bytes for operator to set.
      Returns:
      This builder for chaining.