Input.java

// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: sigstore_verification.proto
// Protobuf Java Version: 4.30.2

package dev.sigstore.proto.verification.v1;

/**
 * <pre>
 * Input captures all that is needed to call the bundle verification method,
 * to verify a single artifact referenced by the bundle.
 * </pre>
 *
 * Protobuf type {@code dev.sigstore.verification.v1.Input}
 */
@javax.annotation.Generated(value="protoc", comments="annotations:Input.java.pb.meta")
public final class Input extends
    com.google.protobuf.GeneratedMessage implements
    // @@protoc_insertion_point(message_implements:dev.sigstore.verification.v1.Input)
    InputOrBuilder {
private static final long serialVersionUID = 0L;
  static {
    com.google.protobuf.RuntimeVersion.validateProtobufGencodeVersion(
      com.google.protobuf.RuntimeVersion.RuntimeDomain.PUBLIC,
      /* major= */ 4,
      /* minor= */ 30,
      /* patch= */ 2,
      /* suffix= */ "",
      Input.class.getName());
  }
  // Use Input.newBuilder() to construct.
  private Input(com.google.protobuf.GeneratedMessage.Builder<?> builder) {
    super(builder);
  }
  private Input() {
  }

  public static final com.google.protobuf.Descriptors.Descriptor
      getDescriptor() {
    return dev.sigstore.proto.verification.v1.VerificationProto.internal_static_dev_sigstore_verification_v1_Input_descriptor;
  }

  @java.lang.Override
  protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
      internalGetFieldAccessorTable() {
    return dev.sigstore.proto.verification.v1.VerificationProto.internal_static_dev_sigstore_verification_v1_Input_fieldAccessorTable
        .ensureFieldAccessorsInitialized(
            dev.sigstore.proto.verification.v1.Input.class, dev.sigstore.proto.verification.v1.Input.Builder.class);
  }

  private int bitField0_;
  public static final int ARTIFACT_TRUST_ROOT_FIELD_NUMBER = 1;
  private dev.sigstore.proto.trustroot.v1.TrustedRoot artifactTrustRoot_;
  /**
   * <pre>
   * The verification materials provided during a bundle verification.
   * The running process is usually preloaded with a "global"
   * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
   * verifying an artifact (i.e a bundle), and/or based on current
   * policy, some selection is expected to happen, to filter out the
   * exact certificate authority to use, which transparency logs are
   * relevant etc. The result should b ecaptured in the
   * `artifact_trust_root`.
   * </pre>
   *
   * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
   * @return Whether the artifactTrustRoot field is set.
   */
  @java.lang.Override
  public boolean hasArtifactTrustRoot() {
    return ((bitField0_ & 0x00000001) != 0);
  }
  /**
   * <pre>
   * The verification materials provided during a bundle verification.
   * The running process is usually preloaded with a "global"
   * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
   * verifying an artifact (i.e a bundle), and/or based on current
   * policy, some selection is expected to happen, to filter out the
   * exact certificate authority to use, which transparency logs are
   * relevant etc. The result should b ecaptured in the
   * `artifact_trust_root`.
   * </pre>
   *
   * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
   * @return The artifactTrustRoot.
   */
  @java.lang.Override
  public dev.sigstore.proto.trustroot.v1.TrustedRoot getArtifactTrustRoot() {
    return artifactTrustRoot_ == null ? dev.sigstore.proto.trustroot.v1.TrustedRoot.getDefaultInstance() : artifactTrustRoot_;
  }
  /**
   * <pre>
   * The verification materials provided during a bundle verification.
   * The running process is usually preloaded with a "global"
   * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
   * verifying an artifact (i.e a bundle), and/or based on current
   * policy, some selection is expected to happen, to filter out the
   * exact certificate authority to use, which transparency logs are
   * relevant etc. The result should b ecaptured in the
   * `artifact_trust_root`.
   * </pre>
   *
   * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.trustroot.v1.TrustedRootOrBuilder getArtifactTrustRootOrBuilder() {
    return artifactTrustRoot_ == null ? dev.sigstore.proto.trustroot.v1.TrustedRoot.getDefaultInstance() : artifactTrustRoot_;
  }

  public static final int ARTIFACT_VERIFICATION_OPTIONS_FIELD_NUMBER = 2;
  private dev.sigstore.proto.verification.v1.ArtifactVerificationOptions artifactVerificationOptions_;
  /**
   * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
   * @return Whether the artifactVerificationOptions field is set.
   */
  @java.lang.Override
  public boolean hasArtifactVerificationOptions() {
    return ((bitField0_ & 0x00000002) != 0);
  }
  /**
   * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
   * @return The artifactVerificationOptions.
   */
  @java.lang.Override
  public dev.sigstore.proto.verification.v1.ArtifactVerificationOptions getArtifactVerificationOptions() {
    return artifactVerificationOptions_ == null ? dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.getDefaultInstance() : artifactVerificationOptions_;
  }
  /**
   * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.verification.v1.ArtifactVerificationOptionsOrBuilder getArtifactVerificationOptionsOrBuilder() {
    return artifactVerificationOptions_ == null ? dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.getDefaultInstance() : artifactVerificationOptions_;
  }

  public static final int BUNDLE_FIELD_NUMBER = 3;
  private dev.sigstore.proto.bundle.v1.Bundle bundle_;
  /**
   * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
   * @return Whether the bundle field is set.
   */
  @java.lang.Override
  public boolean hasBundle() {
    return ((bitField0_ & 0x00000004) != 0);
  }
  /**
   * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
   * @return The bundle.
   */
  @java.lang.Override
  public dev.sigstore.proto.bundle.v1.Bundle getBundle() {
    return bundle_ == null ? dev.sigstore.proto.bundle.v1.Bundle.getDefaultInstance() : bundle_;
  }
  /**
   * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.bundle.v1.BundleOrBuilder getBundleOrBuilder() {
    return bundle_ == null ? dev.sigstore.proto.bundle.v1.Bundle.getDefaultInstance() : bundle_;
  }

  public static final int ARTIFACT_FIELD_NUMBER = 4;
  private dev.sigstore.proto.verification.v1.Artifact artifact_;
  /**
   * <pre>
   * If the bundle contains a message signature, the artifact must be
   * provided.
   * </pre>
   *
   * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
   * @return Whether the artifact field is set.
   */
  @java.lang.Override
  public boolean hasArtifact() {
    return ((bitField0_ & 0x00000008) != 0);
  }
  /**
   * <pre>
   * If the bundle contains a message signature, the artifact must be
   * provided.
   * </pre>
   *
   * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
   * @return The artifact.
   */
  @java.lang.Override
  public dev.sigstore.proto.verification.v1.Artifact getArtifact() {
    return artifact_ == null ? dev.sigstore.proto.verification.v1.Artifact.getDefaultInstance() : artifact_;
  }
  /**
   * <pre>
   * If the bundle contains a message signature, the artifact must be
   * provided.
   * </pre>
   *
   * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
   */
  @java.lang.Override
  public dev.sigstore.proto.verification.v1.ArtifactOrBuilder getArtifactOrBuilder() {
    return artifact_ == null ? dev.sigstore.proto.verification.v1.Artifact.getDefaultInstance() : artifact_;
  }

  private byte memoizedIsInitialized = -1;
  @java.lang.Override
  public final boolean isInitialized() {
    byte isInitialized = memoizedIsInitialized;
    if (isInitialized == 1) return true;
    if (isInitialized == 0) return false;

    memoizedIsInitialized = 1;
    return true;
  }

  @java.lang.Override
  public void writeTo(com.google.protobuf.CodedOutputStream output)
                      throws java.io.IOException {
    if (((bitField0_ & 0x00000001) != 0)) {
      output.writeMessage(1, getArtifactTrustRoot());
    }
    if (((bitField0_ & 0x00000002) != 0)) {
      output.writeMessage(2, getArtifactVerificationOptions());
    }
    if (((bitField0_ & 0x00000004) != 0)) {
      output.writeMessage(3, getBundle());
    }
    if (((bitField0_ & 0x00000008) != 0)) {
      output.writeMessage(4, getArtifact());
    }
    getUnknownFields().writeTo(output);
  }

  @java.lang.Override
  public int getSerializedSize() {
    int size = memoizedSize;
    if (size != -1) return size;

    size = 0;
    if (((bitField0_ & 0x00000001) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(1, getArtifactTrustRoot());
    }
    if (((bitField0_ & 0x00000002) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(2, getArtifactVerificationOptions());
    }
    if (((bitField0_ & 0x00000004) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(3, getBundle());
    }
    if (((bitField0_ & 0x00000008) != 0)) {
      size += com.google.protobuf.CodedOutputStream
        .computeMessageSize(4, getArtifact());
    }
    size += getUnknownFields().getSerializedSize();
    memoizedSize = size;
    return size;
  }

  @java.lang.Override
  public boolean equals(final java.lang.Object obj) {
    if (obj == this) {
     return true;
    }
    if (!(obj instanceof dev.sigstore.proto.verification.v1.Input)) {
      return super.equals(obj);
    }
    dev.sigstore.proto.verification.v1.Input other = (dev.sigstore.proto.verification.v1.Input) obj;

    if (hasArtifactTrustRoot() != other.hasArtifactTrustRoot()) return false;
    if (hasArtifactTrustRoot()) {
      if (!getArtifactTrustRoot()
          .equals(other.getArtifactTrustRoot())) return false;
    }
    if (hasArtifactVerificationOptions() != other.hasArtifactVerificationOptions()) return false;
    if (hasArtifactVerificationOptions()) {
      if (!getArtifactVerificationOptions()
          .equals(other.getArtifactVerificationOptions())) return false;
    }
    if (hasBundle() != other.hasBundle()) return false;
    if (hasBundle()) {
      if (!getBundle()
          .equals(other.getBundle())) return false;
    }
    if (hasArtifact() != other.hasArtifact()) return false;
    if (hasArtifact()) {
      if (!getArtifact()
          .equals(other.getArtifact())) return false;
    }
    if (!getUnknownFields().equals(other.getUnknownFields())) return false;
    return true;
  }

  @java.lang.Override
  public int hashCode() {
    if (memoizedHashCode != 0) {
      return memoizedHashCode;
    }
    int hash = 41;
    hash = (19 * hash) + getDescriptor().hashCode();
    if (hasArtifactTrustRoot()) {
      hash = (37 * hash) + ARTIFACT_TRUST_ROOT_FIELD_NUMBER;
      hash = (53 * hash) + getArtifactTrustRoot().hashCode();
    }
    if (hasArtifactVerificationOptions()) {
      hash = (37 * hash) + ARTIFACT_VERIFICATION_OPTIONS_FIELD_NUMBER;
      hash = (53 * hash) + getArtifactVerificationOptions().hashCode();
    }
    if (hasBundle()) {
      hash = (37 * hash) + BUNDLE_FIELD_NUMBER;
      hash = (53 * hash) + getBundle().hashCode();
    }
    if (hasArtifact()) {
      hash = (37 * hash) + ARTIFACT_FIELD_NUMBER;
      hash = (53 * hash) + getArtifact().hashCode();
    }
    hash = (29 * hash) + getUnknownFields().hashCode();
    memoizedHashCode = hash;
    return hash;
  }

  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      java.nio.ByteBuffer data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      java.nio.ByteBuffer data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      com.google.protobuf.ByteString data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      com.google.protobuf.ByteString data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(byte[] data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      byte[] data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      java.io.InputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input, extensionRegistry);
  }

  public static dev.sigstore.proto.verification.v1.Input parseDelimitedFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseDelimitedWithIOException(PARSER, input);
  }

  public static dev.sigstore.proto.verification.v1.Input parseDelimitedFrom(
      java.io.InputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseDelimitedWithIOException(PARSER, input, extensionRegistry);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      com.google.protobuf.CodedInputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input);
  }
  public static dev.sigstore.proto.verification.v1.Input parseFrom(
      com.google.protobuf.CodedInputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessage
        .parseWithIOException(PARSER, input, extensionRegistry);
  }

  @java.lang.Override
  public Builder newBuilderForType() { return newBuilder(); }
  public static Builder newBuilder() {
    return DEFAULT_INSTANCE.toBuilder();
  }
  public static Builder newBuilder(dev.sigstore.proto.verification.v1.Input prototype) {
    return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
  }
  @java.lang.Override
  public Builder toBuilder() {
    return this == DEFAULT_INSTANCE
        ? new Builder() : new Builder().mergeFrom(this);
  }

  @java.lang.Override
  protected Builder newBuilderForType(
      com.google.protobuf.GeneratedMessage.BuilderParent parent) {
    Builder builder = new Builder(parent);
    return builder;
  }
  /**
   * <pre>
   * Input captures all that is needed to call the bundle verification method,
   * to verify a single artifact referenced by the bundle.
   * </pre>
   *
   * Protobuf type {@code dev.sigstore.verification.v1.Input}
   */
  public static final class Builder extends
      com.google.protobuf.GeneratedMessage.Builder<Builder> implements
      // @@protoc_insertion_point(builder_implements:dev.sigstore.verification.v1.Input)
      dev.sigstore.proto.verification.v1.InputOrBuilder {
    public static final com.google.protobuf.Descriptors.Descriptor
        getDescriptor() {
      return dev.sigstore.proto.verification.v1.VerificationProto.internal_static_dev_sigstore_verification_v1_Input_descriptor;
    }

    @java.lang.Override
    protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
        internalGetFieldAccessorTable() {
      return dev.sigstore.proto.verification.v1.VerificationProto.internal_static_dev_sigstore_verification_v1_Input_fieldAccessorTable
          .ensureFieldAccessorsInitialized(
              dev.sigstore.proto.verification.v1.Input.class, dev.sigstore.proto.verification.v1.Input.Builder.class);
    }

    // Construct using dev.sigstore.proto.verification.v1.Input.newBuilder()
    private Builder() {
      maybeForceBuilderInitialization();
    }

    private Builder(
        com.google.protobuf.GeneratedMessage.BuilderParent parent) {
      super(parent);
      maybeForceBuilderInitialization();
    }
    private void maybeForceBuilderInitialization() {
      if (com.google.protobuf.GeneratedMessage
              .alwaysUseFieldBuilders) {
        internalGetArtifactTrustRootFieldBuilder();
        internalGetArtifactVerificationOptionsFieldBuilder();
        internalGetBundleFieldBuilder();
        internalGetArtifactFieldBuilder();
      }
    }
    @java.lang.Override
    public Builder clear() {
      super.clear();
      bitField0_ = 0;
      artifactTrustRoot_ = null;
      if (artifactTrustRootBuilder_ != null) {
        artifactTrustRootBuilder_.dispose();
        artifactTrustRootBuilder_ = null;
      }
      artifactVerificationOptions_ = null;
      if (artifactVerificationOptionsBuilder_ != null) {
        artifactVerificationOptionsBuilder_.dispose();
        artifactVerificationOptionsBuilder_ = null;
      }
      bundle_ = null;
      if (bundleBuilder_ != null) {
        bundleBuilder_.dispose();
        bundleBuilder_ = null;
      }
      artifact_ = null;
      if (artifactBuilder_ != null) {
        artifactBuilder_.dispose();
        artifactBuilder_ = null;
      }
      return this;
    }

    @java.lang.Override
    public com.google.protobuf.Descriptors.Descriptor
        getDescriptorForType() {
      return dev.sigstore.proto.verification.v1.VerificationProto.internal_static_dev_sigstore_verification_v1_Input_descriptor;
    }

    @java.lang.Override
    public dev.sigstore.proto.verification.v1.Input getDefaultInstanceForType() {
      return dev.sigstore.proto.verification.v1.Input.getDefaultInstance();
    }

    @java.lang.Override
    public dev.sigstore.proto.verification.v1.Input build() {
      dev.sigstore.proto.verification.v1.Input result = buildPartial();
      if (!result.isInitialized()) {
        throw newUninitializedMessageException(result);
      }
      return result;
    }

    @java.lang.Override
    public dev.sigstore.proto.verification.v1.Input buildPartial() {
      dev.sigstore.proto.verification.v1.Input result = new dev.sigstore.proto.verification.v1.Input(this);
      if (bitField0_ != 0) { buildPartial0(result); }
      onBuilt();
      return result;
    }

    private void buildPartial0(dev.sigstore.proto.verification.v1.Input result) {
      int from_bitField0_ = bitField0_;
      int to_bitField0_ = 0;
      if (((from_bitField0_ & 0x00000001) != 0)) {
        result.artifactTrustRoot_ = artifactTrustRootBuilder_ == null
            ? artifactTrustRoot_
            : artifactTrustRootBuilder_.build();
        to_bitField0_ |= 0x00000001;
      }
      if (((from_bitField0_ & 0x00000002) != 0)) {
        result.artifactVerificationOptions_ = artifactVerificationOptionsBuilder_ == null
            ? artifactVerificationOptions_
            : artifactVerificationOptionsBuilder_.build();
        to_bitField0_ |= 0x00000002;
      }
      if (((from_bitField0_ & 0x00000004) != 0)) {
        result.bundle_ = bundleBuilder_ == null
            ? bundle_
            : bundleBuilder_.build();
        to_bitField0_ |= 0x00000004;
      }
      if (((from_bitField0_ & 0x00000008) != 0)) {
        result.artifact_ = artifactBuilder_ == null
            ? artifact_
            : artifactBuilder_.build();
        to_bitField0_ |= 0x00000008;
      }
      result.bitField0_ |= to_bitField0_;
    }

    @java.lang.Override
    public Builder mergeFrom(com.google.protobuf.Message other) {
      if (other instanceof dev.sigstore.proto.verification.v1.Input) {
        return mergeFrom((dev.sigstore.proto.verification.v1.Input)other);
      } else {
        super.mergeFrom(other);
        return this;
      }
    }

    public Builder mergeFrom(dev.sigstore.proto.verification.v1.Input other) {
      if (other == dev.sigstore.proto.verification.v1.Input.getDefaultInstance()) return this;
      if (other.hasArtifactTrustRoot()) {
        mergeArtifactTrustRoot(other.getArtifactTrustRoot());
      }
      if (other.hasArtifactVerificationOptions()) {
        mergeArtifactVerificationOptions(other.getArtifactVerificationOptions());
      }
      if (other.hasBundle()) {
        mergeBundle(other.getBundle());
      }
      if (other.hasArtifact()) {
        mergeArtifact(other.getArtifact());
      }
      this.mergeUnknownFields(other.getUnknownFields());
      onChanged();
      return this;
    }

    @java.lang.Override
    public final boolean isInitialized() {
      return true;
    }

    @java.lang.Override
    public Builder mergeFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws java.io.IOException {
      if (extensionRegistry == null) {
        throw new java.lang.NullPointerException();
      }
      try {
        boolean done = false;
        while (!done) {
          int tag = input.readTag();
          switch (tag) {
            case 0:
              done = true;
              break;
            case 10: {
              input.readMessage(
                  internalGetArtifactTrustRootFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000001;
              break;
            } // case 10
            case 18: {
              input.readMessage(
                  internalGetArtifactVerificationOptionsFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000002;
              break;
            } // case 18
            case 26: {
              input.readMessage(
                  internalGetBundleFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000004;
              break;
            } // case 26
            case 34: {
              input.readMessage(
                  internalGetArtifactFieldBuilder().getBuilder(),
                  extensionRegistry);
              bitField0_ |= 0x00000008;
              break;
            } // case 34
            default: {
              if (!super.parseUnknownField(input, extensionRegistry, tag)) {
                done = true; // was an endgroup tag
              }
              break;
            } // default:
          } // switch (tag)
        } // while (!done)
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.unwrapIOException();
      } finally {
        onChanged();
      } // finally
      return this;
    }
    private int bitField0_;

    private dev.sigstore.proto.trustroot.v1.TrustedRoot artifactTrustRoot_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.trustroot.v1.TrustedRoot, dev.sigstore.proto.trustroot.v1.TrustedRoot.Builder, dev.sigstore.proto.trustroot.v1.TrustedRootOrBuilder> artifactTrustRootBuilder_;
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     * @return Whether the artifactTrustRoot field is set.
     */
    public boolean hasArtifactTrustRoot() {
      return ((bitField0_ & 0x00000001) != 0);
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     * @return The artifactTrustRoot.
     */
    public dev.sigstore.proto.trustroot.v1.TrustedRoot getArtifactTrustRoot() {
      if (artifactTrustRootBuilder_ == null) {
        return artifactTrustRoot_ == null ? dev.sigstore.proto.trustroot.v1.TrustedRoot.getDefaultInstance() : artifactTrustRoot_;
      } else {
        return artifactTrustRootBuilder_.getMessage();
      }
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public Builder setArtifactTrustRoot(dev.sigstore.proto.trustroot.v1.TrustedRoot value) {
      if (artifactTrustRootBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        artifactTrustRoot_ = value;
      } else {
        artifactTrustRootBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000001;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public Builder setArtifactTrustRoot(
        dev.sigstore.proto.trustroot.v1.TrustedRoot.Builder builderForValue) {
      if (artifactTrustRootBuilder_ == null) {
        artifactTrustRoot_ = builderForValue.build();
      } else {
        artifactTrustRootBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000001;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public Builder mergeArtifactTrustRoot(dev.sigstore.proto.trustroot.v1.TrustedRoot value) {
      if (artifactTrustRootBuilder_ == null) {
        if (((bitField0_ & 0x00000001) != 0) &&
          artifactTrustRoot_ != null &&
          artifactTrustRoot_ != dev.sigstore.proto.trustroot.v1.TrustedRoot.getDefaultInstance()) {
          getArtifactTrustRootBuilder().mergeFrom(value);
        } else {
          artifactTrustRoot_ = value;
        }
      } else {
        artifactTrustRootBuilder_.mergeFrom(value);
      }
      if (artifactTrustRoot_ != null) {
        bitField0_ |= 0x00000001;
        onChanged();
      }
      return this;
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public Builder clearArtifactTrustRoot() {
      bitField0_ = (bitField0_ & ~0x00000001);
      artifactTrustRoot_ = null;
      if (artifactTrustRootBuilder_ != null) {
        artifactTrustRootBuilder_.dispose();
        artifactTrustRootBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public dev.sigstore.proto.trustroot.v1.TrustedRoot.Builder getArtifactTrustRootBuilder() {
      bitField0_ |= 0x00000001;
      onChanged();
      return internalGetArtifactTrustRootFieldBuilder().getBuilder();
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    public dev.sigstore.proto.trustroot.v1.TrustedRootOrBuilder getArtifactTrustRootOrBuilder() {
      if (artifactTrustRootBuilder_ != null) {
        return artifactTrustRootBuilder_.getMessageOrBuilder();
      } else {
        return artifactTrustRoot_ == null ?
            dev.sigstore.proto.trustroot.v1.TrustedRoot.getDefaultInstance() : artifactTrustRoot_;
      }
    }
    /**
     * <pre>
     * The verification materials provided during a bundle verification.
     * The running process is usually preloaded with a "global"
     * dev.sisgtore.trustroot.TrustedRoot.v1 instance. Prior to
     * verifying an artifact (i.e a bundle), and/or based on current
     * policy, some selection is expected to happen, to filter out the
     * exact certificate authority to use, which transparency logs are
     * relevant etc. The result should b ecaptured in the
     * `artifact_trust_root`.
     * </pre>
     *
     * <code>.dev.sigstore.trustroot.v1.TrustedRoot artifact_trust_root = 1;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.trustroot.v1.TrustedRoot, dev.sigstore.proto.trustroot.v1.TrustedRoot.Builder, dev.sigstore.proto.trustroot.v1.TrustedRootOrBuilder> 
        internalGetArtifactTrustRootFieldBuilder() {
      if (artifactTrustRootBuilder_ == null) {
        artifactTrustRootBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.trustroot.v1.TrustedRoot, dev.sigstore.proto.trustroot.v1.TrustedRoot.Builder, dev.sigstore.proto.trustroot.v1.TrustedRootOrBuilder>(
                getArtifactTrustRoot(),
                getParentForChildren(),
                isClean());
        artifactTrustRoot_ = null;
      }
      return artifactTrustRootBuilder_;
    }

    private dev.sigstore.proto.verification.v1.ArtifactVerificationOptions artifactVerificationOptions_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.verification.v1.ArtifactVerificationOptions, dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.Builder, dev.sigstore.proto.verification.v1.ArtifactVerificationOptionsOrBuilder> artifactVerificationOptionsBuilder_;
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     * @return Whether the artifactVerificationOptions field is set.
     */
    public boolean hasArtifactVerificationOptions() {
      return ((bitField0_ & 0x00000002) != 0);
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     * @return The artifactVerificationOptions.
     */
    public dev.sigstore.proto.verification.v1.ArtifactVerificationOptions getArtifactVerificationOptions() {
      if (artifactVerificationOptionsBuilder_ == null) {
        return artifactVerificationOptions_ == null ? dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.getDefaultInstance() : artifactVerificationOptions_;
      } else {
        return artifactVerificationOptionsBuilder_.getMessage();
      }
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public Builder setArtifactVerificationOptions(dev.sigstore.proto.verification.v1.ArtifactVerificationOptions value) {
      if (artifactVerificationOptionsBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        artifactVerificationOptions_ = value;
      } else {
        artifactVerificationOptionsBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public Builder setArtifactVerificationOptions(
        dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.Builder builderForValue) {
      if (artifactVerificationOptionsBuilder_ == null) {
        artifactVerificationOptions_ = builderForValue.build();
      } else {
        artifactVerificationOptionsBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public Builder mergeArtifactVerificationOptions(dev.sigstore.proto.verification.v1.ArtifactVerificationOptions value) {
      if (artifactVerificationOptionsBuilder_ == null) {
        if (((bitField0_ & 0x00000002) != 0) &&
          artifactVerificationOptions_ != null &&
          artifactVerificationOptions_ != dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.getDefaultInstance()) {
          getArtifactVerificationOptionsBuilder().mergeFrom(value);
        } else {
          artifactVerificationOptions_ = value;
        }
      } else {
        artifactVerificationOptionsBuilder_.mergeFrom(value);
      }
      if (artifactVerificationOptions_ != null) {
        bitField0_ |= 0x00000002;
        onChanged();
      }
      return this;
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public Builder clearArtifactVerificationOptions() {
      bitField0_ = (bitField0_ & ~0x00000002);
      artifactVerificationOptions_ = null;
      if (artifactVerificationOptionsBuilder_ != null) {
        artifactVerificationOptionsBuilder_.dispose();
        artifactVerificationOptionsBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.Builder getArtifactVerificationOptionsBuilder() {
      bitField0_ |= 0x00000002;
      onChanged();
      return internalGetArtifactVerificationOptionsFieldBuilder().getBuilder();
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    public dev.sigstore.proto.verification.v1.ArtifactVerificationOptionsOrBuilder getArtifactVerificationOptionsOrBuilder() {
      if (artifactVerificationOptionsBuilder_ != null) {
        return artifactVerificationOptionsBuilder_.getMessageOrBuilder();
      } else {
        return artifactVerificationOptions_ == null ?
            dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.getDefaultInstance() : artifactVerificationOptions_;
      }
    }
    /**
     * <code>.dev.sigstore.verification.v1.ArtifactVerificationOptions artifact_verification_options = 2;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.verification.v1.ArtifactVerificationOptions, dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.Builder, dev.sigstore.proto.verification.v1.ArtifactVerificationOptionsOrBuilder> 
        internalGetArtifactVerificationOptionsFieldBuilder() {
      if (artifactVerificationOptionsBuilder_ == null) {
        artifactVerificationOptionsBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.verification.v1.ArtifactVerificationOptions, dev.sigstore.proto.verification.v1.ArtifactVerificationOptions.Builder, dev.sigstore.proto.verification.v1.ArtifactVerificationOptionsOrBuilder>(
                getArtifactVerificationOptions(),
                getParentForChildren(),
                isClean());
        artifactVerificationOptions_ = null;
      }
      return artifactVerificationOptionsBuilder_;
    }

    private dev.sigstore.proto.bundle.v1.Bundle bundle_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.bundle.v1.Bundle, dev.sigstore.proto.bundle.v1.Bundle.Builder, dev.sigstore.proto.bundle.v1.BundleOrBuilder> bundleBuilder_;
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     * @return Whether the bundle field is set.
     */
    public boolean hasBundle() {
      return ((bitField0_ & 0x00000004) != 0);
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     * @return The bundle.
     */
    public dev.sigstore.proto.bundle.v1.Bundle getBundle() {
      if (bundleBuilder_ == null) {
        return bundle_ == null ? dev.sigstore.proto.bundle.v1.Bundle.getDefaultInstance() : bundle_;
      } else {
        return bundleBuilder_.getMessage();
      }
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public Builder setBundle(dev.sigstore.proto.bundle.v1.Bundle value) {
      if (bundleBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        bundle_ = value;
      } else {
        bundleBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public Builder setBundle(
        dev.sigstore.proto.bundle.v1.Bundle.Builder builderForValue) {
      if (bundleBuilder_ == null) {
        bundle_ = builderForValue.build();
      } else {
        bundleBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public Builder mergeBundle(dev.sigstore.proto.bundle.v1.Bundle value) {
      if (bundleBuilder_ == null) {
        if (((bitField0_ & 0x00000004) != 0) &&
          bundle_ != null &&
          bundle_ != dev.sigstore.proto.bundle.v1.Bundle.getDefaultInstance()) {
          getBundleBuilder().mergeFrom(value);
        } else {
          bundle_ = value;
        }
      } else {
        bundleBuilder_.mergeFrom(value);
      }
      if (bundle_ != null) {
        bitField0_ |= 0x00000004;
        onChanged();
      }
      return this;
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public Builder clearBundle() {
      bitField0_ = (bitField0_ & ~0x00000004);
      bundle_ = null;
      if (bundleBuilder_ != null) {
        bundleBuilder_.dispose();
        bundleBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public dev.sigstore.proto.bundle.v1.Bundle.Builder getBundleBuilder() {
      bitField0_ |= 0x00000004;
      onChanged();
      return internalGetBundleFieldBuilder().getBuilder();
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    public dev.sigstore.proto.bundle.v1.BundleOrBuilder getBundleOrBuilder() {
      if (bundleBuilder_ != null) {
        return bundleBuilder_.getMessageOrBuilder();
      } else {
        return bundle_ == null ?
            dev.sigstore.proto.bundle.v1.Bundle.getDefaultInstance() : bundle_;
      }
    }
    /**
     * <code>.dev.sigstore.bundle.v1.Bundle bundle = 3;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.bundle.v1.Bundle, dev.sigstore.proto.bundle.v1.Bundle.Builder, dev.sigstore.proto.bundle.v1.BundleOrBuilder> 
        internalGetBundleFieldBuilder() {
      if (bundleBuilder_ == null) {
        bundleBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.bundle.v1.Bundle, dev.sigstore.proto.bundle.v1.Bundle.Builder, dev.sigstore.proto.bundle.v1.BundleOrBuilder>(
                getBundle(),
                getParentForChildren(),
                isClean());
        bundle_ = null;
      }
      return bundleBuilder_;
    }

    private dev.sigstore.proto.verification.v1.Artifact artifact_;
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.verification.v1.Artifact, dev.sigstore.proto.verification.v1.Artifact.Builder, dev.sigstore.proto.verification.v1.ArtifactOrBuilder> artifactBuilder_;
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     * @return Whether the artifact field is set.
     */
    public boolean hasArtifact() {
      return ((bitField0_ & 0x00000008) != 0);
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     * @return The artifact.
     */
    public dev.sigstore.proto.verification.v1.Artifact getArtifact() {
      if (artifactBuilder_ == null) {
        return artifact_ == null ? dev.sigstore.proto.verification.v1.Artifact.getDefaultInstance() : artifact_;
      } else {
        return artifactBuilder_.getMessage();
      }
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public Builder setArtifact(dev.sigstore.proto.verification.v1.Artifact value) {
      if (artifactBuilder_ == null) {
        if (value == null) {
          throw new NullPointerException();
        }
        artifact_ = value;
      } else {
        artifactBuilder_.setMessage(value);
      }
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public Builder setArtifact(
        dev.sigstore.proto.verification.v1.Artifact.Builder builderForValue) {
      if (artifactBuilder_ == null) {
        artifact_ = builderForValue.build();
      } else {
        artifactBuilder_.setMessage(builderForValue.build());
      }
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public Builder mergeArtifact(dev.sigstore.proto.verification.v1.Artifact value) {
      if (artifactBuilder_ == null) {
        if (((bitField0_ & 0x00000008) != 0) &&
          artifact_ != null &&
          artifact_ != dev.sigstore.proto.verification.v1.Artifact.getDefaultInstance()) {
          getArtifactBuilder().mergeFrom(value);
        } else {
          artifact_ = value;
        }
      } else {
        artifactBuilder_.mergeFrom(value);
      }
      if (artifact_ != null) {
        bitField0_ |= 0x00000008;
        onChanged();
      }
      return this;
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public Builder clearArtifact() {
      bitField0_ = (bitField0_ & ~0x00000008);
      artifact_ = null;
      if (artifactBuilder_ != null) {
        artifactBuilder_.dispose();
        artifactBuilder_ = null;
      }
      onChanged();
      return this;
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public dev.sigstore.proto.verification.v1.Artifact.Builder getArtifactBuilder() {
      bitField0_ |= 0x00000008;
      onChanged();
      return internalGetArtifactFieldBuilder().getBuilder();
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    public dev.sigstore.proto.verification.v1.ArtifactOrBuilder getArtifactOrBuilder() {
      if (artifactBuilder_ != null) {
        return artifactBuilder_.getMessageOrBuilder();
      } else {
        return artifact_ == null ?
            dev.sigstore.proto.verification.v1.Artifact.getDefaultInstance() : artifact_;
      }
    }
    /**
     * <pre>
     * If the bundle contains a message signature, the artifact must be
     * provided.
     * </pre>
     *
     * <code>optional .dev.sigstore.verification.v1.Artifact artifact = 4;</code>
     */
    private com.google.protobuf.SingleFieldBuilder<
        dev.sigstore.proto.verification.v1.Artifact, dev.sigstore.proto.verification.v1.Artifact.Builder, dev.sigstore.proto.verification.v1.ArtifactOrBuilder> 
        internalGetArtifactFieldBuilder() {
      if (artifactBuilder_ == null) {
        artifactBuilder_ = new com.google.protobuf.SingleFieldBuilder<
            dev.sigstore.proto.verification.v1.Artifact, dev.sigstore.proto.verification.v1.Artifact.Builder, dev.sigstore.proto.verification.v1.ArtifactOrBuilder>(
                getArtifact(),
                getParentForChildren(),
                isClean());
        artifact_ = null;
      }
      return artifactBuilder_;
    }

    // @@protoc_insertion_point(builder_scope:dev.sigstore.verification.v1.Input)
  }

  // @@protoc_insertion_point(class_scope:dev.sigstore.verification.v1.Input)
  private static final dev.sigstore.proto.verification.v1.Input DEFAULT_INSTANCE;
  static {
    DEFAULT_INSTANCE = new dev.sigstore.proto.verification.v1.Input();
  }

  public static dev.sigstore.proto.verification.v1.Input getDefaultInstance() {
    return DEFAULT_INSTANCE;
  }

  private static final com.google.protobuf.Parser<Input>
      PARSER = new com.google.protobuf.AbstractParser<Input>() {
    @java.lang.Override
    public Input parsePartialFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws com.google.protobuf.InvalidProtocolBufferException {
      Builder builder = newBuilder();
      try {
        builder.mergeFrom(input, extensionRegistry);
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.setUnfinishedMessage(builder.buildPartial());
      } catch (com.google.protobuf.UninitializedMessageException e) {
        throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
      } catch (java.io.IOException e) {
        throw new com.google.protobuf.InvalidProtocolBufferException(e)
            .setUnfinishedMessage(builder.buildPartial());
      }
      return builder.buildPartial();
    }
  };

  public static com.google.protobuf.Parser<Input> parser() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.protobuf.Parser<Input> getParserForType() {
    return PARSER;
  }

  @java.lang.Override
  public dev.sigstore.proto.verification.v1.Input getDefaultInstanceForType() {
    return DEFAULT_INSTANCE;
  }

}