Fix 15 ProtobufTransformer findings:
* Upgrade to the latest edition (15 times)
* See go/editions for more information about this migration.
* Based on blaze dependency analysis, these protos were found to only used in languages known to support editions.* If this proto is later required in a language that doesn't support editions yet, a pure rollback is safe and recommended.
See go/protobuf-edition-zero-lsc for more information on why you've received this change and why it is important.
This CL looks good? Just LGTM and Approve it!
This CL doesn’t look good? This is what you can do:
* Revert this CL, by replying "REVERT: <provide reason>"
* File a bug under go/protobuf-transformer-issue for category ProtobufTransformer if there's an issue with the CL content.
* File a bug under go/rosie-bug if there's an issue with how the CL was managed.
* For all other issues such as the formatting of the CL, please file a bug under
go/clrobot-bug.
* Revert this CL and not get a CL that cleans up these paths in the future by
replying "BLOCKLIST: <provide reason>". This is not reversible! We recommend to
opt out the respective paths in your CL Robot configuration instead:
go/clrobot-opt-out.
This CL was generated by CL Robot - a tool that cleans up code findings
(go/clrobot). The affected code paths have been enabled for CL Robot in //depot/google3/METADATA by
following go/clrobot#how-to-opt-in. Anything wrong with the signup? File a bug
at go/clrobot-bug.
#codehealth
Tested:
Local presubmit tests passed.
PiperOrigin-RevId: 618466227
diff --git a/quiche/blind_sign_auth/proto/spend_token_data.proto b/quiche/blind_sign_auth/proto/spend_token_data.proto
index 671067b..29cf891 100644
--- a/quiche/blind_sign_auth/proto/spend_token_data.proto
+++ b/quiche/blind_sign_auth/proto/spend_token_data.proto
@@ -12,29 +12,37 @@
// See the License for the specific language governing permissions and
// limitations under the License.
-syntax = "proto3";
+edition = "2023";
package privacy.ppn;
import "quiche/blind_sign_auth/proto/public_metadata.proto";
import "anonymous_tokens/proto/anonymous_tokens.proto";
+option features.field_presence = IMPLICIT;
+
message SpendTokenData {
// Public metadata associated with the token being spent.
// See go/ppn-token-spend and go/ppn-phosphor-at-service for details.
PublicMetadata public_metadata = 1;
+
// The unblinded token to be spent which was blind-signed by Phosphor.
bytes unblinded_token = 2;
+
// The signature for the token to be spent, obtained from Phosphor and
// unblinded.
bytes unblinded_token_signature = 3;
+
// The version number of the signing key that was used during blind-signing.
uint64 signing_key_version = 4;
+
// A use case identifying the caller. Should be a fixed, hardcoded value to
// prevent cross-spending tokens.
anonymous_tokens.AnonymousTokensUseCase use_case = 5;
+
// Nonce used to mask plaintext message before cryptographic verification.
bytes message_mask = 6;
+
// General public metadata. Use deserializer to inspect. Only set one of this
// or public_metadata.
bytes binary_public_metadata = 7;
@@ -43,8 +51,10 @@
message PrivacyPassTokenData {
// The base64 encoded Privacy Pass token.
string token = 1;
+
// The base64 encoded, Privacy Pass compliant binary public metadata.
string encoded_extensions = 2;
+
// Populate only for testing, this will affect which public key is used.
anonymous_tokens.AnonymousTokensUseCase use_case_override =
3;