/*
 * Copyright 2020 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/dataproc/v1/clusters.proto

package com.google.cloud.dataproc.v1;

/**
 *
 *
 * <pre>
 * Specifies Kerberos related configuration.
 * </pre>
 *
 * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
 */
public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3
    implements
    // @@protoc_insertion_point(message_implements:google.cloud.dataproc.v1.KerberosConfig)
    KerberosConfigOrBuilder {
  private static final long serialVersionUID = 0L;
  // Use KerberosConfig.newBuilder() to construct.
  private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) {
    super(builder);
  }

  private KerberosConfig() {
    rootPrincipalPasswordUri_ = "";
    kmsKeyUri_ = "";
    keystoreUri_ = "";
    truststoreUri_ = "";
    keystorePasswordUri_ = "";
    keyPasswordUri_ = "";
    truststorePasswordUri_ = "";
    crossRealmTrustRealm_ = "";
    crossRealmTrustKdc_ = "";
    crossRealmTrustAdminServer_ = "";
    crossRealmTrustSharedPasswordUri_ = "";
    kdcDbKeyUri_ = "";
    realm_ = "";
  }

  @java.lang.Override
  @SuppressWarnings({"unused"})
  protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
    return new KerberosConfig();
  }

  @java.lang.Override
  public final com.google.protobuf.UnknownFieldSet getUnknownFields() {
    return this.unknownFields;
  }

  public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
    return com.google.cloud.dataproc.v1.ClustersProto
        .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
  }

  @java.lang.Override
  protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internalGetFieldAccessorTable() {
    return com.google.cloud.dataproc.v1.ClustersProto
        .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
        .ensureFieldAccessorsInitialized(
            com.google.cloud.dataproc.v1.KerberosConfig.class,
            com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
  }

  public static final int ENABLE_KERBEROS_FIELD_NUMBER = 1;
  private boolean enableKerberos_ = false;
  /**
   *
   *
   * <pre>
   * Optional. Flag to indicate whether to Kerberize the cluster (default:
   * false). Set this field to true to enable Kerberos on a cluster.
   * </pre>
   *
   * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The enableKerberos.
   */
  @java.lang.Override
  public boolean getEnableKerberos() {
    return enableKerberos_;
  }

  public static final int ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER = 2;

  @SuppressWarnings("serial")
  private volatile java.lang.Object rootPrincipalPasswordUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
   * principal password.
   * </pre>
   *
   * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The rootPrincipalPasswordUri.
   */
  @java.lang.Override
  public java.lang.String getRootPrincipalPasswordUri() {
    java.lang.Object ref = rootPrincipalPasswordUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      rootPrincipalPasswordUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
   * principal password.
   * </pre>
   *
   * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for rootPrincipalPasswordUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
    java.lang.Object ref = rootPrincipalPasswordUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      rootPrincipalPasswordUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int KMS_KEY_URI_FIELD_NUMBER = 3;

  @SuppressWarnings("serial")
  private volatile java.lang.Object kmsKeyUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The uri of the KMS key used to encrypt various sensitive
   * files.
   * </pre>
   *
   * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The kmsKeyUri.
   */
  @java.lang.Override
  public java.lang.String getKmsKeyUri() {
    java.lang.Object ref = kmsKeyUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      kmsKeyUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The uri of the KMS key used to encrypt various sensitive
   * files.
   * </pre>
   *
   * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for kmsKeyUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getKmsKeyUriBytes() {
    java.lang.Object ref = kmsKeyUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      kmsKeyUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int KEYSTORE_URI_FIELD_NUMBER = 4;

  @SuppressWarnings("serial")
  private volatile java.lang.Object keystoreUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of the keystore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * </pre>
   *
   * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The keystoreUri.
   */
  @java.lang.Override
  public java.lang.String getKeystoreUri() {
    java.lang.Object ref = keystoreUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      keystoreUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of the keystore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * </pre>
   *
   * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for keystoreUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getKeystoreUriBytes() {
    java.lang.Object ref = keystoreUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      keystoreUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int TRUSTSTORE_URI_FIELD_NUMBER = 5;

  @SuppressWarnings("serial")
  private volatile java.lang.Object truststoreUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of the truststore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * </pre>
   *
   * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The truststoreUri.
   */
  @java.lang.Override
  public java.lang.String getTruststoreUri() {
    java.lang.Object ref = truststoreUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      truststoreUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of the truststore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * </pre>
   *
   * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for truststoreUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getTruststoreUriBytes() {
    java.lang.Object ref = truststoreUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      truststoreUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int KEYSTORE_PASSWORD_URI_FIELD_NUMBER = 6;

  @SuppressWarnings("serial")
  private volatile java.lang.Object keystorePasswordUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided keystore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * </pre>
   *
   * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The keystorePasswordUri.
   */
  @java.lang.Override
  public java.lang.String getKeystorePasswordUri() {
    java.lang.Object ref = keystorePasswordUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      keystorePasswordUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided keystore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * </pre>
   *
   * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for keystorePasswordUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
    java.lang.Object ref = keystorePasswordUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      keystorePasswordUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int KEY_PASSWORD_URI_FIELD_NUMBER = 7;

  @SuppressWarnings("serial")
  private volatile java.lang.Object keyPasswordUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided key. For the self-signed certificate, this
   * password is generated by Dataproc.
   * </pre>
   *
   * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The keyPasswordUri.
   */
  @java.lang.Override
  public java.lang.String getKeyPasswordUri() {
    java.lang.Object ref = keyPasswordUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      keyPasswordUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided key. For the self-signed certificate, this
   * password is generated by Dataproc.
   * </pre>
   *
   * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for keyPasswordUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
    java.lang.Object ref = keyPasswordUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      keyPasswordUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER = 8;

  @SuppressWarnings("serial")
  private volatile java.lang.Object truststorePasswordUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided truststore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * </pre>
   *
   * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The truststorePasswordUri.
   */
  @java.lang.Override
  public java.lang.String getTruststorePasswordUri() {
    java.lang.Object ref = truststorePasswordUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      truststorePasswordUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided truststore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * </pre>
   *
   * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for truststorePasswordUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
    java.lang.Object ref = truststorePasswordUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      truststorePasswordUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int CROSS_REALM_TRUST_REALM_FIELD_NUMBER = 9;

  @SuppressWarnings("serial")
  private volatile java.lang.Object crossRealmTrustRealm_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
   * the user enable cross realm trust.
   * </pre>
   *
   * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The crossRealmTrustRealm.
   */
  @java.lang.Override
  public java.lang.String getCrossRealmTrustRealm() {
    java.lang.Object ref = crossRealmTrustRealm_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      crossRealmTrustRealm_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
   * the user enable cross realm trust.
   * </pre>
   *
   * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for crossRealmTrustRealm.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
    java.lang.Object ref = crossRealmTrustRealm_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      crossRealmTrustRealm_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int CROSS_REALM_TRUST_KDC_FIELD_NUMBER = 10;

  @SuppressWarnings("serial")
  private volatile java.lang.Object crossRealmTrustKdc_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
   * realm trust relationship.
   * </pre>
   *
   * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The crossRealmTrustKdc.
   */
  @java.lang.Override
  public java.lang.String getCrossRealmTrustKdc() {
    java.lang.Object ref = crossRealmTrustKdc_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      crossRealmTrustKdc_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
   * realm trust relationship.
   * </pre>
   *
   * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for crossRealmTrustKdc.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
    java.lang.Object ref = crossRealmTrustKdc_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      crossRealmTrustKdc_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER = 11;

  @SuppressWarnings("serial")
  private volatile java.lang.Object crossRealmTrustAdminServer_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The admin server (IP or hostname) for the remote trusted realm in
   * a cross realm trust relationship.
   * </pre>
   *
   * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
   * </code>
   *
   * @return The crossRealmTrustAdminServer.
   */
  @java.lang.Override
  public java.lang.String getCrossRealmTrustAdminServer() {
    java.lang.Object ref = crossRealmTrustAdminServer_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      crossRealmTrustAdminServer_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The admin server (IP or hostname) for the remote trusted realm in
   * a cross realm trust relationship.
   * </pre>
   *
   * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
   * </code>
   *
   * @return The bytes for crossRealmTrustAdminServer.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
    java.lang.Object ref = crossRealmTrustAdminServer_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      crossRealmTrustAdminServer_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER = 12;

  @SuppressWarnings("serial")
  private volatile java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * shared password between the on-cluster Kerberos realm and the remote
   * trusted realm, in a cross realm trust relationship.
   * </pre>
   *
   * <code>
   * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
   * </code>
   *
   * @return The crossRealmTrustSharedPasswordUri.
   */
  @java.lang.Override
  public java.lang.String getCrossRealmTrustSharedPasswordUri() {
    java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      crossRealmTrustSharedPasswordUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * shared password between the on-cluster Kerberos realm and the remote
   * trusted realm, in a cross realm trust relationship.
   * </pre>
   *
   * <code>
   * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
   * </code>
   *
   * @return The bytes for crossRealmTrustSharedPasswordUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
    java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      crossRealmTrustSharedPasswordUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int KDC_DB_KEY_URI_FIELD_NUMBER = 13;

  @SuppressWarnings("serial")
  private volatile java.lang.Object kdcDbKeyUri_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * master key of the KDC database.
   * </pre>
   *
   * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The kdcDbKeyUri.
   */
  @java.lang.Override
  public java.lang.String getKdcDbKeyUri() {
    java.lang.Object ref = kdcDbKeyUri_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      kdcDbKeyUri_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * master key of the KDC database.
   * </pre>
   *
   * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for kdcDbKeyUri.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
    java.lang.Object ref = kdcDbKeyUri_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      kdcDbKeyUri_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int TGT_LIFETIME_HOURS_FIELD_NUMBER = 14;
  private int tgtLifetimeHours_ = 0;
  /**
   *
   *
   * <pre>
   * Optional. The lifetime of the ticket granting ticket, in hours.
   * If not specified, or user specifies 0, then default value 10
   * will be used.
   * </pre>
   *
   * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The tgtLifetimeHours.
   */
  @java.lang.Override
  public int getTgtLifetimeHours() {
    return tgtLifetimeHours_;
  }

  public static final int REALM_FIELD_NUMBER = 15;

  @SuppressWarnings("serial")
  private volatile java.lang.Object realm_ = "";
  /**
   *
   *
   * <pre>
   * Optional. The name of the on-cluster Kerberos realm.
   * If not specified, the uppercased domain of hostnames will be the realm.
   * </pre>
   *
   * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The realm.
   */
  @java.lang.Override
  public java.lang.String getRealm() {
    java.lang.Object ref = realm_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      realm_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * Optional. The name of the on-cluster Kerberos realm.
   * If not specified, the uppercased domain of hostnames will be the realm.
   * </pre>
   *
   * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
   *
   * @return The bytes for realm.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getRealmBytes() {
    java.lang.Object ref = realm_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      realm_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  private byte memoizedIsInitialized = -1;

  @java.lang.Override
  public final boolean isInitialized() {
    byte isInitialized = memoizedIsInitialized;
    if (isInitialized == 1) return true;
    if (isInitialized == 0) return false;

    memoizedIsInitialized = 1;
    return true;
  }

  @java.lang.Override
  public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
    if (enableKerberos_ != false) {
      output.writeBool(1, enableKerberos_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 2, rootPrincipalPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 3, kmsKeyUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 4, keystoreUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 5, truststoreUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 6, keystorePasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 7, keyPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 8, truststorePasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 9, crossRealmTrustRealm_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 10, crossRealmTrustKdc_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 11, crossRealmTrustAdminServer_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(
          output, 12, crossRealmTrustSharedPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 13, kdcDbKeyUri_);
    }
    if (tgtLifetimeHours_ != 0) {
      output.writeInt32(14, tgtLifetimeHours_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 15, realm_);
    }
    getUnknownFields().writeTo(output);
  }

  @java.lang.Override
  public int getSerializedSize() {
    int size = memoizedSize;
    if (size != -1) return size;

    size = 0;
    if (enableKerberos_ != false) {
      size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, enableKerberos_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
      size +=
          com.google.protobuf.GeneratedMessageV3.computeStringSize(2, rootPrincipalPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, kmsKeyUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, keystoreUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, truststoreUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, keystorePasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, keyPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(8, truststorePasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(9, crossRealmTrustRealm_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(10, crossRealmTrustKdc_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
      size +=
          com.google.protobuf.GeneratedMessageV3.computeStringSize(11, crossRealmTrustAdminServer_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
      size +=
          com.google.protobuf.GeneratedMessageV3.computeStringSize(
              12, crossRealmTrustSharedPasswordUri_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(13, kdcDbKeyUri_);
    }
    if (tgtLifetimeHours_ != 0) {
      size += com.google.protobuf.CodedOutputStream.computeInt32Size(14, tgtLifetimeHours_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(15, realm_);
    }
    size += getUnknownFields().getSerializedSize();
    memoizedSize = size;
    return size;
  }

  @java.lang.Override
  public boolean equals(final java.lang.Object obj) {
    if (obj == this) {
      return true;
    }
    if (!(obj instanceof com.google.cloud.dataproc.v1.KerberosConfig)) {
      return super.equals(obj);
    }
    com.google.cloud.dataproc.v1.KerberosConfig other =
        (com.google.cloud.dataproc.v1.KerberosConfig) obj;

    if (getEnableKerberos() != other.getEnableKerberos()) return false;
    if (!getRootPrincipalPasswordUri().equals(other.getRootPrincipalPasswordUri())) return false;
    if (!getKmsKeyUri().equals(other.getKmsKeyUri())) return false;
    if (!getKeystoreUri().equals(other.getKeystoreUri())) return false;
    if (!getTruststoreUri().equals(other.getTruststoreUri())) return false;
    if (!getKeystorePasswordUri().equals(other.getKeystorePasswordUri())) return false;
    if (!getKeyPasswordUri().equals(other.getKeyPasswordUri())) return false;
    if (!getTruststorePasswordUri().equals(other.getTruststorePasswordUri())) return false;
    if (!getCrossRealmTrustRealm().equals(other.getCrossRealmTrustRealm())) return false;
    if (!getCrossRealmTrustKdc().equals(other.getCrossRealmTrustKdc())) return false;
    if (!getCrossRealmTrustAdminServer().equals(other.getCrossRealmTrustAdminServer()))
      return false;
    if (!getCrossRealmTrustSharedPasswordUri().equals(other.getCrossRealmTrustSharedPasswordUri()))
      return false;
    if (!getKdcDbKeyUri().equals(other.getKdcDbKeyUri())) return false;
    if (getTgtLifetimeHours() != other.getTgtLifetimeHours()) return false;
    if (!getRealm().equals(other.getRealm())) return false;
    if (!getUnknownFields().equals(other.getUnknownFields())) return false;
    return true;
  }

  @java.lang.Override
  public int hashCode() {
    if (memoizedHashCode != 0) {
      return memoizedHashCode;
    }
    int hash = 41;
    hash = (19 * hash) + getDescriptor().hashCode();
    hash = (37 * hash) + ENABLE_KERBEROS_FIELD_NUMBER;
    hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEnableKerberos());
    hash = (37 * hash) + ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER;
    hash = (53 * hash) + getRootPrincipalPasswordUri().hashCode();
    hash = (37 * hash) + KMS_KEY_URI_FIELD_NUMBER;
    hash = (53 * hash) + getKmsKeyUri().hashCode();
    hash = (37 * hash) + KEYSTORE_URI_FIELD_NUMBER;
    hash = (53 * hash) + getKeystoreUri().hashCode();
    hash = (37 * hash) + TRUSTSTORE_URI_FIELD_NUMBER;
    hash = (53 * hash) + getTruststoreUri().hashCode();
    hash = (37 * hash) + KEYSTORE_PASSWORD_URI_FIELD_NUMBER;
    hash = (53 * hash) + getKeystorePasswordUri().hashCode();
    hash = (37 * hash) + KEY_PASSWORD_URI_FIELD_NUMBER;
    hash = (53 * hash) + getKeyPasswordUri().hashCode();
    hash = (37 * hash) + TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER;
    hash = (53 * hash) + getTruststorePasswordUri().hashCode();
    hash = (37 * hash) + CROSS_REALM_TRUST_REALM_FIELD_NUMBER;
    hash = (53 * hash) + getCrossRealmTrustRealm().hashCode();
    hash = (37 * hash) + CROSS_REALM_TRUST_KDC_FIELD_NUMBER;
    hash = (53 * hash) + getCrossRealmTrustKdc().hashCode();
    hash = (37 * hash) + CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER;
    hash = (53 * hash) + getCrossRealmTrustAdminServer().hashCode();
    hash = (37 * hash) + CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER;
    hash = (53 * hash) + getCrossRealmTrustSharedPasswordUri().hashCode();
    hash = (37 * hash) + KDC_DB_KEY_URI_FIELD_NUMBER;
    hash = (53 * hash) + getKdcDbKeyUri().hashCode();
    hash = (37 * hash) + TGT_LIFETIME_HOURS_FIELD_NUMBER;
    hash = (53 * hash) + getTgtLifetimeHours();
    hash = (37 * hash) + REALM_FIELD_NUMBER;
    hash = (53 * hash) + getRealm().hashCode();
    hash = (29 * hash) + getUnknownFields().hashCode();
    memoizedHashCode = hash;
    return hash;
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.nio.ByteBuffer data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      com.google.protobuf.ByteString data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      com.google.protobuf.ByteString data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(byte[] data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
        PARSER, input, extensionRegistry);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
      java.io.InputStream input) throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
      java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
        PARSER, input, extensionRegistry);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      com.google.protobuf.CodedInputStream input) throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
      com.google.protobuf.CodedInputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
        PARSER, input, extensionRegistry);
  }

  @java.lang.Override
  public Builder newBuilderForType() {
    return newBuilder();
  }

  public static Builder newBuilder() {
    return DEFAULT_INSTANCE.toBuilder();
  }

  public static Builder newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype) {
    return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
  }

  @java.lang.Override
  public Builder toBuilder() {
    return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
  }

  @java.lang.Override
  protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
    Builder builder = new Builder(parent);
    return builder;
  }
  /**
   *
   *
   * <pre>
   * Specifies Kerberos related configuration.
   * </pre>
   *
   * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
   */
  public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder<Builder>
      implements
      // @@protoc_insertion_point(builder_implements:google.cloud.dataproc.v1.KerberosConfig)
      com.google.cloud.dataproc.v1.KerberosConfigOrBuilder {
    public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
      return com.google.cloud.dataproc.v1.ClustersProto
          .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
    }

    @java.lang.Override
    protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
        internalGetFieldAccessorTable() {
      return com.google.cloud.dataproc.v1.ClustersProto
          .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
          .ensureFieldAccessorsInitialized(
              com.google.cloud.dataproc.v1.KerberosConfig.class,
              com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
    }

    // Construct using com.google.cloud.dataproc.v1.KerberosConfig.newBuilder()
    private Builder() {}

    private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
      super(parent);
    }

    @java.lang.Override
    public Builder clear() {
      super.clear();
      bitField0_ = 0;
      enableKerberos_ = false;
      rootPrincipalPasswordUri_ = "";
      kmsKeyUri_ = "";
      keystoreUri_ = "";
      truststoreUri_ = "";
      keystorePasswordUri_ = "";
      keyPasswordUri_ = "";
      truststorePasswordUri_ = "";
      crossRealmTrustRealm_ = "";
      crossRealmTrustKdc_ = "";
      crossRealmTrustAdminServer_ = "";
      crossRealmTrustSharedPasswordUri_ = "";
      kdcDbKeyUri_ = "";
      tgtLifetimeHours_ = 0;
      realm_ = "";
      return this;
    }

    @java.lang.Override
    public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() {
      return com.google.cloud.dataproc.v1.ClustersProto
          .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
    }

    @java.lang.Override
    public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
      return com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance();
    }

    @java.lang.Override
    public com.google.cloud.dataproc.v1.KerberosConfig build() {
      com.google.cloud.dataproc.v1.KerberosConfig result = buildPartial();
      if (!result.isInitialized()) {
        throw newUninitializedMessageException(result);
      }
      return result;
    }

    @java.lang.Override
    public com.google.cloud.dataproc.v1.KerberosConfig buildPartial() {
      com.google.cloud.dataproc.v1.KerberosConfig result =
          new com.google.cloud.dataproc.v1.KerberosConfig(this);
      if (bitField0_ != 0) {
        buildPartial0(result);
      }
      onBuilt();
      return result;
    }

    private void buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result) {
      int from_bitField0_ = bitField0_;
      if (((from_bitField0_ & 0x00000001) != 0)) {
        result.enableKerberos_ = enableKerberos_;
      }
      if (((from_bitField0_ & 0x00000002) != 0)) {
        result.rootPrincipalPasswordUri_ = rootPrincipalPasswordUri_;
      }
      if (((from_bitField0_ & 0x00000004) != 0)) {
        result.kmsKeyUri_ = kmsKeyUri_;
      }
      if (((from_bitField0_ & 0x00000008) != 0)) {
        result.keystoreUri_ = keystoreUri_;
      }
      if (((from_bitField0_ & 0x00000010) != 0)) {
        result.truststoreUri_ = truststoreUri_;
      }
      if (((from_bitField0_ & 0x00000020) != 0)) {
        result.keystorePasswordUri_ = keystorePasswordUri_;
      }
      if (((from_bitField0_ & 0x00000040) != 0)) {
        result.keyPasswordUri_ = keyPasswordUri_;
      }
      if (((from_bitField0_ & 0x00000080) != 0)) {
        result.truststorePasswordUri_ = truststorePasswordUri_;
      }
      if (((from_bitField0_ & 0x00000100) != 0)) {
        result.crossRealmTrustRealm_ = crossRealmTrustRealm_;
      }
      if (((from_bitField0_ & 0x00000200) != 0)) {
        result.crossRealmTrustKdc_ = crossRealmTrustKdc_;
      }
      if (((from_bitField0_ & 0x00000400) != 0)) {
        result.crossRealmTrustAdminServer_ = crossRealmTrustAdminServer_;
      }
      if (((from_bitField0_ & 0x00000800) != 0)) {
        result.crossRealmTrustSharedPasswordUri_ = crossRealmTrustSharedPasswordUri_;
      }
      if (((from_bitField0_ & 0x00001000) != 0)) {
        result.kdcDbKeyUri_ = kdcDbKeyUri_;
      }
      if (((from_bitField0_ & 0x00002000) != 0)) {
        result.tgtLifetimeHours_ = tgtLifetimeHours_;
      }
      if (((from_bitField0_ & 0x00004000) != 0)) {
        result.realm_ = realm_;
      }
    }

    @java.lang.Override
    public Builder clone() {
      return super.clone();
    }

    @java.lang.Override
    public Builder setField(
        com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
      return super.setField(field, value);
    }

    @java.lang.Override
    public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) {
      return super.clearField(field);
    }

    @java.lang.Override
    public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) {
      return super.clearOneof(oneof);
    }

    @java.lang.Override
    public Builder setRepeatedField(
        com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) {
      return super.setRepeatedField(field, index, value);
    }

    @java.lang.Override
    public Builder addRepeatedField(
        com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
      return super.addRepeatedField(field, value);
    }

    @java.lang.Override
    public Builder mergeFrom(com.google.protobuf.Message other) {
      if (other instanceof com.google.cloud.dataproc.v1.KerberosConfig) {
        return mergeFrom((com.google.cloud.dataproc.v1.KerberosConfig) other);
      } else {
        super.mergeFrom(other);
        return this;
      }
    }

    public Builder mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other) {
      if (other == com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance()) return this;
      if (other.getEnableKerberos() != false) {
        setEnableKerberos(other.getEnableKerberos());
      }
      if (!other.getRootPrincipalPasswordUri().isEmpty()) {
        rootPrincipalPasswordUri_ = other.rootPrincipalPasswordUri_;
        bitField0_ |= 0x00000002;
        onChanged();
      }
      if (!other.getKmsKeyUri().isEmpty()) {
        kmsKeyUri_ = other.kmsKeyUri_;
        bitField0_ |= 0x00000004;
        onChanged();
      }
      if (!other.getKeystoreUri().isEmpty()) {
        keystoreUri_ = other.keystoreUri_;
        bitField0_ |= 0x00000008;
        onChanged();
      }
      if (!other.getTruststoreUri().isEmpty()) {
        truststoreUri_ = other.truststoreUri_;
        bitField0_ |= 0x00000010;
        onChanged();
      }
      if (!other.getKeystorePasswordUri().isEmpty()) {
        keystorePasswordUri_ = other.keystorePasswordUri_;
        bitField0_ |= 0x00000020;
        onChanged();
      }
      if (!other.getKeyPasswordUri().isEmpty()) {
        keyPasswordUri_ = other.keyPasswordUri_;
        bitField0_ |= 0x00000040;
        onChanged();
      }
      if (!other.getTruststorePasswordUri().isEmpty()) {
        truststorePasswordUri_ = other.truststorePasswordUri_;
        bitField0_ |= 0x00000080;
        onChanged();
      }
      if (!other.getCrossRealmTrustRealm().isEmpty()) {
        crossRealmTrustRealm_ = other.crossRealmTrustRealm_;
        bitField0_ |= 0x00000100;
        onChanged();
      }
      if (!other.getCrossRealmTrustKdc().isEmpty()) {
        crossRealmTrustKdc_ = other.crossRealmTrustKdc_;
        bitField0_ |= 0x00000200;
        onChanged();
      }
      if (!other.getCrossRealmTrustAdminServer().isEmpty()) {
        crossRealmTrustAdminServer_ = other.crossRealmTrustAdminServer_;
        bitField0_ |= 0x00000400;
        onChanged();
      }
      if (!other.getCrossRealmTrustSharedPasswordUri().isEmpty()) {
        crossRealmTrustSharedPasswordUri_ = other.crossRealmTrustSharedPasswordUri_;
        bitField0_ |= 0x00000800;
        onChanged();
      }
      if (!other.getKdcDbKeyUri().isEmpty()) {
        kdcDbKeyUri_ = other.kdcDbKeyUri_;
        bitField0_ |= 0x00001000;
        onChanged();
      }
      if (other.getTgtLifetimeHours() != 0) {
        setTgtLifetimeHours(other.getTgtLifetimeHours());
      }
      if (!other.getRealm().isEmpty()) {
        realm_ = other.realm_;
        bitField0_ |= 0x00004000;
        onChanged();
      }
      this.mergeUnknownFields(other.getUnknownFields());
      onChanged();
      return this;
    }

    @java.lang.Override
    public final boolean isInitialized() {
      return true;
    }

    @java.lang.Override
    public Builder mergeFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws java.io.IOException {
      if (extensionRegistry == null) {
        throw new java.lang.NullPointerException();
      }
      try {
        boolean done = false;
        while (!done) {
          int tag = input.readTag();
          switch (tag) {
            case 0:
              done = true;
              break;
            case 8:
              {
                enableKerberos_ = input.readBool();
                bitField0_ |= 0x00000001;
                break;
              } // case 8
            case 18:
              {
                rootPrincipalPasswordUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000002;
                break;
              } // case 18
            case 26:
              {
                kmsKeyUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000004;
                break;
              } // case 26
            case 34:
              {
                keystoreUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000008;
                break;
              } // case 34
            case 42:
              {
                truststoreUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000010;
                break;
              } // case 42
            case 50:
              {
                keystorePasswordUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000020;
                break;
              } // case 50
            case 58:
              {
                keyPasswordUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000040;
                break;
              } // case 58
            case 66:
              {
                truststorePasswordUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000080;
                break;
              } // case 66
            case 74:
              {
                crossRealmTrustRealm_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000100;
                break;
              } // case 74
            case 82:
              {
                crossRealmTrustKdc_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000200;
                break;
              } // case 82
            case 90:
              {
                crossRealmTrustAdminServer_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000400;
                break;
              } // case 90
            case 98:
              {
                crossRealmTrustSharedPasswordUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000800;
                break;
              } // case 98
            case 106:
              {
                kdcDbKeyUri_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00001000;
                break;
              } // case 106
            case 112:
              {
                tgtLifetimeHours_ = input.readInt32();
                bitField0_ |= 0x00002000;
                break;
              } // case 112
            case 122:
              {
                realm_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00004000;
                break;
              } // case 122
            default:
              {
                if (!super.parseUnknownField(input, extensionRegistry, tag)) {
                  done = true; // was an endgroup tag
                }
                break;
              } // default:
          } // switch (tag)
        } // while (!done)
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.unwrapIOException();
      } finally {
        onChanged();
      } // finally
      return this;
    }

    private int bitField0_;

    private boolean enableKerberos_;
    /**
     *
     *
     * <pre>
     * Optional. Flag to indicate whether to Kerberize the cluster (default:
     * false). Set this field to true to enable Kerberos on a cluster.
     * </pre>
     *
     * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The enableKerberos.
     */
    @java.lang.Override
    public boolean getEnableKerberos() {
      return enableKerberos_;
    }
    /**
     *
     *
     * <pre>
     * Optional. Flag to indicate whether to Kerberize the cluster (default:
     * false). Set this field to true to enable Kerberos on a cluster.
     * </pre>
     *
     * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The enableKerberos to set.
     * @return This builder for chaining.
     */
    public Builder setEnableKerberos(boolean value) {

      enableKerberos_ = value;
      bitField0_ |= 0x00000001;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. Flag to indicate whether to Kerberize the cluster (default:
     * false). Set this field to true to enable Kerberos on a cluster.
     * </pre>
     *
     * <code>bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearEnableKerberos() {
      bitField0_ = (bitField0_ & ~0x00000001);
      enableKerberos_ = false;
      onChanged();
      return this;
    }

    private java.lang.Object rootPrincipalPasswordUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * </pre>
     *
     * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The rootPrincipalPasswordUri.
     */
    public java.lang.String getRootPrincipalPasswordUri() {
      java.lang.Object ref = rootPrincipalPasswordUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        rootPrincipalPasswordUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * </pre>
     *
     * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The bytes for rootPrincipalPasswordUri.
     */
    public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
      java.lang.Object ref = rootPrincipalPasswordUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        rootPrincipalPasswordUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * </pre>
     *
     * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The rootPrincipalPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setRootPrincipalPasswordUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      rootPrincipalPasswordUri_ = value;
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * </pre>
     *
     * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return This builder for chaining.
     */
    public Builder clearRootPrincipalPasswordUri() {
      rootPrincipalPasswordUri_ = getDefaultInstance().getRootPrincipalPasswordUri();
      bitField0_ = (bitField0_ & ~0x00000002);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * </pre>
     *
     * <code>string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The bytes for rootPrincipalPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      rootPrincipalPasswordUri_ = value;
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }

    private java.lang.Object kmsKeyUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The uri of the KMS key used to encrypt various sensitive
     * files.
     * </pre>
     *
     * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The kmsKeyUri.
     */
    public java.lang.String getKmsKeyUri() {
      java.lang.Object ref = kmsKeyUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        kmsKeyUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The uri of the KMS key used to encrypt various sensitive
     * files.
     * </pre>
     *
     * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for kmsKeyUri.
     */
    public com.google.protobuf.ByteString getKmsKeyUriBytes() {
      java.lang.Object ref = kmsKeyUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        kmsKeyUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The uri of the KMS key used to encrypt various sensitive
     * files.
     * </pre>
     *
     * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The kmsKeyUri to set.
     * @return This builder for chaining.
     */
    public Builder setKmsKeyUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      kmsKeyUri_ = value;
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The uri of the KMS key used to encrypt various sensitive
     * files.
     * </pre>
     *
     * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearKmsKeyUri() {
      kmsKeyUri_ = getDefaultInstance().getKmsKeyUri();
      bitField0_ = (bitField0_ & ~0x00000004);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The uri of the KMS key used to encrypt various sensitive
     * files.
     * </pre>
     *
     * <code>string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for kmsKeyUri to set.
     * @return This builder for chaining.
     */
    public Builder setKmsKeyUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      kmsKeyUri_ = value;
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }

    private java.lang.Object keystoreUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The keystoreUri.
     */
    public java.lang.String getKeystoreUri() {
      java.lang.Object ref = keystoreUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        keystoreUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for keystoreUri.
     */
    public com.google.protobuf.ByteString getKeystoreUriBytes() {
      java.lang.Object ref = keystoreUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        keystoreUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The keystoreUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeystoreUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      keystoreUri_ = value;
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearKeystoreUri() {
      keystoreUri_ = getDefaultInstance().getKeystoreUri();
      bitField0_ = (bitField0_ & ~0x00000008);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for keystoreUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeystoreUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      keystoreUri_ = value;
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }

    private java.lang.Object truststoreUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The truststoreUri.
     */
    public java.lang.String getTruststoreUri() {
      java.lang.Object ref = truststoreUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        truststoreUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for truststoreUri.
     */
    public com.google.protobuf.ByteString getTruststoreUriBytes() {
      java.lang.Object ref = truststoreUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        truststoreUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The truststoreUri to set.
     * @return This builder for chaining.
     */
    public Builder setTruststoreUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      truststoreUri_ = value;
      bitField0_ |= 0x00000010;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearTruststoreUri() {
      truststoreUri_ = getDefaultInstance().getTruststoreUri();
      bitField0_ = (bitField0_ & ~0x00000010);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * </pre>
     *
     * <code>string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for truststoreUri to set.
     * @return This builder for chaining.
     */
    public Builder setTruststoreUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      truststoreUri_ = value;
      bitField0_ |= 0x00000010;
      onChanged();
      return this;
    }

    private java.lang.Object keystorePasswordUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The keystorePasswordUri.
     */
    public java.lang.String getKeystorePasswordUri() {
      java.lang.Object ref = keystorePasswordUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        keystorePasswordUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for keystorePasswordUri.
     */
    public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
      java.lang.Object ref = keystorePasswordUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        keystorePasswordUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The keystorePasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeystorePasswordUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      keystorePasswordUri_ = value;
      bitField0_ |= 0x00000020;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearKeystorePasswordUri() {
      keystorePasswordUri_ = getDefaultInstance().getKeystorePasswordUri();
      bitField0_ = (bitField0_ & ~0x00000020);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for keystorePasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeystorePasswordUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      keystorePasswordUri_ = value;
      bitField0_ |= 0x00000020;
      onChanged();
      return this;
    }

    private java.lang.Object keyPasswordUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * </pre>
     *
     * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The keyPasswordUri.
     */
    public java.lang.String getKeyPasswordUri() {
      java.lang.Object ref = keyPasswordUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        keyPasswordUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * </pre>
     *
     * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for keyPasswordUri.
     */
    public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
      java.lang.Object ref = keyPasswordUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        keyPasswordUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * </pre>
     *
     * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The keyPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeyPasswordUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      keyPasswordUri_ = value;
      bitField0_ |= 0x00000040;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * </pre>
     *
     * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearKeyPasswordUri() {
      keyPasswordUri_ = getDefaultInstance().getKeyPasswordUri();
      bitField0_ = (bitField0_ & ~0x00000040);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * </pre>
     *
     * <code>string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for keyPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setKeyPasswordUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      keyPasswordUri_ = value;
      bitField0_ |= 0x00000040;
      onChanged();
      return this;
    }

    private java.lang.Object truststorePasswordUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The truststorePasswordUri.
     */
    public java.lang.String getTruststorePasswordUri() {
      java.lang.Object ref = truststorePasswordUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        truststorePasswordUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for truststorePasswordUri.
     */
    public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
      java.lang.Object ref = truststorePasswordUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        truststorePasswordUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The truststorePasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setTruststorePasswordUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      truststorePasswordUri_ = value;
      bitField0_ |= 0x00000080;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearTruststorePasswordUri() {
      truststorePasswordUri_ = getDefaultInstance().getTruststorePasswordUri();
      bitField0_ = (bitField0_ & ~0x00000080);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * </pre>
     *
     * <code>string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for truststorePasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setTruststorePasswordUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      truststorePasswordUri_ = value;
      bitField0_ |= 0x00000080;
      onChanged();
      return this;
    }

    private java.lang.Object crossRealmTrustRealm_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * </pre>
     *
     * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The crossRealmTrustRealm.
     */
    public java.lang.String getCrossRealmTrustRealm() {
      java.lang.Object ref = crossRealmTrustRealm_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        crossRealmTrustRealm_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * </pre>
     *
     * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for crossRealmTrustRealm.
     */
    public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
      java.lang.Object ref = crossRealmTrustRealm_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        crossRealmTrustRealm_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * </pre>
     *
     * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The crossRealmTrustRealm to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustRealm(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      crossRealmTrustRealm_ = value;
      bitField0_ |= 0x00000100;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * </pre>
     *
     * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearCrossRealmTrustRealm() {
      crossRealmTrustRealm_ = getDefaultInstance().getCrossRealmTrustRealm();
      bitField0_ = (bitField0_ & ~0x00000100);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * </pre>
     *
     * <code>string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for crossRealmTrustRealm to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      crossRealmTrustRealm_ = value;
      bitField0_ |= 0x00000100;
      onChanged();
      return this;
    }

    private java.lang.Object crossRealmTrustKdc_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The crossRealmTrustKdc.
     */
    public java.lang.String getCrossRealmTrustKdc() {
      java.lang.Object ref = crossRealmTrustKdc_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        crossRealmTrustKdc_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for crossRealmTrustKdc.
     */
    public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
      java.lang.Object ref = crossRealmTrustKdc_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        crossRealmTrustKdc_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The crossRealmTrustKdc to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustKdc(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      crossRealmTrustKdc_ = value;
      bitField0_ |= 0x00000200;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearCrossRealmTrustKdc() {
      crossRealmTrustKdc_ = getDefaultInstance().getCrossRealmTrustKdc();
      bitField0_ = (bitField0_ & ~0x00000200);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for crossRealmTrustKdc to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      crossRealmTrustKdc_ = value;
      bitField0_ |= 0x00000200;
      onChanged();
      return this;
    }

    private java.lang.Object crossRealmTrustAdminServer_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The crossRealmTrustAdminServer.
     */
    public java.lang.String getCrossRealmTrustAdminServer() {
      java.lang.Object ref = crossRealmTrustAdminServer_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        crossRealmTrustAdminServer_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The bytes for crossRealmTrustAdminServer.
     */
    public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
      java.lang.Object ref = crossRealmTrustAdminServer_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        crossRealmTrustAdminServer_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The crossRealmTrustAdminServer to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustAdminServer(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      crossRealmTrustAdminServer_ = value;
      bitField0_ |= 0x00000400;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return This builder for chaining.
     */
    public Builder clearCrossRealmTrustAdminServer() {
      crossRealmTrustAdminServer_ = getDefaultInstance().getCrossRealmTrustAdminServer();
      bitField0_ = (bitField0_ & ~0x00000400);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * </pre>
     *
     * <code>string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The bytes for crossRealmTrustAdminServer to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      crossRealmTrustAdminServer_ = value;
      bitField0_ |= 0x00000400;
      onChanged();
      return this;
    }

    private java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * </pre>
     *
     * <code>
     * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The crossRealmTrustSharedPasswordUri.
     */
    public java.lang.String getCrossRealmTrustSharedPasswordUri() {
      java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        crossRealmTrustSharedPasswordUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * </pre>
     *
     * <code>
     * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return The bytes for crossRealmTrustSharedPasswordUri.
     */
    public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
      java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        crossRealmTrustSharedPasswordUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * </pre>
     *
     * <code>
     * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The crossRealmTrustSharedPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustSharedPasswordUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      crossRealmTrustSharedPasswordUri_ = value;
      bitField0_ |= 0x00000800;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * </pre>
     *
     * <code>
     * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @return This builder for chaining.
     */
    public Builder clearCrossRealmTrustSharedPasswordUri() {
      crossRealmTrustSharedPasswordUri_ =
          getDefaultInstance().getCrossRealmTrustSharedPasswordUri();
      bitField0_ = (bitField0_ & ~0x00000800);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * </pre>
     *
     * <code>
     * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
     * </code>
     *
     * @param value The bytes for crossRealmTrustSharedPasswordUri to set.
     * @return This builder for chaining.
     */
    public Builder setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      crossRealmTrustSharedPasswordUri_ = value;
      bitField0_ |= 0x00000800;
      onChanged();
      return this;
    }

    private java.lang.Object kdcDbKeyUri_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * </pre>
     *
     * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The kdcDbKeyUri.
     */
    public java.lang.String getKdcDbKeyUri() {
      java.lang.Object ref = kdcDbKeyUri_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        kdcDbKeyUri_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * </pre>
     *
     * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for kdcDbKeyUri.
     */
    public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
      java.lang.Object ref = kdcDbKeyUri_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        kdcDbKeyUri_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * </pre>
     *
     * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The kdcDbKeyUri to set.
     * @return This builder for chaining.
     */
    public Builder setKdcDbKeyUri(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      kdcDbKeyUri_ = value;
      bitField0_ |= 0x00001000;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * </pre>
     *
     * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearKdcDbKeyUri() {
      kdcDbKeyUri_ = getDefaultInstance().getKdcDbKeyUri();
      bitField0_ = (bitField0_ & ~0x00001000);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * </pre>
     *
     * <code>string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for kdcDbKeyUri to set.
     * @return This builder for chaining.
     */
    public Builder setKdcDbKeyUriBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      kdcDbKeyUri_ = value;
      bitField0_ |= 0x00001000;
      onChanged();
      return this;
    }

    private int tgtLifetimeHours_;
    /**
     *
     *
     * <pre>
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * </pre>
     *
     * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The tgtLifetimeHours.
     */
    @java.lang.Override
    public int getTgtLifetimeHours() {
      return tgtLifetimeHours_;
    }
    /**
     *
     *
     * <pre>
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * </pre>
     *
     * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The tgtLifetimeHours to set.
     * @return This builder for chaining.
     */
    public Builder setTgtLifetimeHours(int value) {

      tgtLifetimeHours_ = value;
      bitField0_ |= 0x00002000;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * </pre>
     *
     * <code>int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearTgtLifetimeHours() {
      bitField0_ = (bitField0_ & ~0x00002000);
      tgtLifetimeHours_ = 0;
      onChanged();
      return this;
    }

    private java.lang.Object realm_ = "";
    /**
     *
     *
     * <pre>
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * </pre>
     *
     * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The realm.
     */
    public java.lang.String getRealm() {
      java.lang.Object ref = realm_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        realm_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * </pre>
     *
     * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return The bytes for realm.
     */
    public com.google.protobuf.ByteString getRealmBytes() {
      java.lang.Object ref = realm_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        realm_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * </pre>
     *
     * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The realm to set.
     * @return This builder for chaining.
     */
    public Builder setRealm(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      realm_ = value;
      bitField0_ |= 0x00004000;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * </pre>
     *
     * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearRealm() {
      realm_ = getDefaultInstance().getRealm();
      bitField0_ = (bitField0_ & ~0x00004000);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * </pre>
     *
     * <code>string realm = 15 [(.google.api.field_behavior) = OPTIONAL];</code>
     *
     * @param value The bytes for realm to set.
     * @return This builder for chaining.
     */
    public Builder setRealmBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      realm_ = value;
      bitField0_ |= 0x00004000;
      onChanged();
      return this;
    }

    @java.lang.Override
    public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
      return super.setUnknownFields(unknownFields);
    }

    @java.lang.Override
    public final Builder mergeUnknownFields(
        final com.google.protobuf.UnknownFieldSet unknownFields) {
      return super.mergeUnknownFields(unknownFields);
    }

    // @@protoc_insertion_point(builder_scope:google.cloud.dataproc.v1.KerberosConfig)
  }

  // @@protoc_insertion_point(class_scope:google.cloud.dataproc.v1.KerberosConfig)
  private static final com.google.cloud.dataproc.v1.KerberosConfig DEFAULT_INSTANCE;

  static {
    DEFAULT_INSTANCE = new com.google.cloud.dataproc.v1.KerberosConfig();
  }

  public static com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstance() {
    return DEFAULT_INSTANCE;
  }

  private static final com.google.protobuf.Parser<KerberosConfig> PARSER =
      new com.google.protobuf.AbstractParser<KerberosConfig>() {
        @java.lang.Override
        public KerberosConfig parsePartialFrom(
            com.google.protobuf.CodedInputStream input,
            com.google.protobuf.ExtensionRegistryLite extensionRegistry)
            throws com.google.protobuf.InvalidProtocolBufferException {
          Builder builder = newBuilder();
          try {
            builder.mergeFrom(input, extensionRegistry);
          } catch (com.google.protobuf.InvalidProtocolBufferException e) {
            throw e.setUnfinishedMessage(builder.buildPartial());
          } catch (com.google.protobuf.UninitializedMessageException e) {
            throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
          } catch (java.io.IOException e) {
            throw new com.google.protobuf.InvalidProtocolBufferException(e)
                .setUnfinishedMessage(builder.buildPartial());
          }
          return builder.buildPartial();
        }
      };

  public static com.google.protobuf.Parser<KerberosConfig> parser() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.protobuf.Parser<KerberosConfig> getParserForType() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
    return DEFAULT_INSTANCE;
  }
}
