/*
 * Copyright 2020 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/websecurityscanner/v1/finding_addon.proto

package com.google.cloud.websecurityscanner.v1;

/**
 *
 *
 * <pre>
 * Information reported for an XSS.
 * </pre>
 *
 * Protobuf type {@code google.cloud.websecurityscanner.v1.Xss}
 */
public final class Xss extends com.google.protobuf.GeneratedMessageV3
    implements
    // @@protoc_insertion_point(message_implements:google.cloud.websecurityscanner.v1.Xss)
    XssOrBuilder {
  private static final long serialVersionUID = 0L;
  // Use Xss.newBuilder() to construct.
  private Xss(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) {
    super(builder);
  }

  private Xss() {
    stackTraces_ = com.google.protobuf.LazyStringArrayList.EMPTY;
    errorMessage_ = "";
    attackVector_ = 0;
    storedXssSeedingUrl_ = "";
  }

  @java.lang.Override
  @SuppressWarnings({"unused"})
  protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
    return new Xss();
  }

  @java.lang.Override
  public final com.google.protobuf.UnknownFieldSet getUnknownFields() {
    return this.unknownFields;
  }

  public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
    return com.google.cloud.websecurityscanner.v1.FindingAddonProto
        .internal_static_google_cloud_websecurityscanner_v1_Xss_descriptor;
  }

  @java.lang.Override
  protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
      internalGetFieldAccessorTable() {
    return com.google.cloud.websecurityscanner.v1.FindingAddonProto
        .internal_static_google_cloud_websecurityscanner_v1_Xss_fieldAccessorTable
        .ensureFieldAccessorsInitialized(
            com.google.cloud.websecurityscanner.v1.Xss.class,
            com.google.cloud.websecurityscanner.v1.Xss.Builder.class);
  }

  /**
   *
   *
   * <pre>
   * Types of XSS attack vector.
   * </pre>
   *
   * Protobuf enum {@code google.cloud.websecurityscanner.v1.Xss.AttackVector}
   */
  public enum AttackVector implements com.google.protobuf.ProtocolMessageEnum {
    /**
     *
     *
     * <pre>
     * Unknown attack vector.
     * </pre>
     *
     * <code>ATTACK_VECTOR_UNSPECIFIED = 0;</code>
     */
    ATTACK_VECTOR_UNSPECIFIED(0),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's localStorage.
     * </pre>
     *
     * <code>LOCAL_STORAGE = 1;</code>
     */
    LOCAL_STORAGE(1),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's sessionStorage.
     * </pre>
     *
     * <code>SESSION_STORAGE = 2;</code>
     */
    SESSION_STORAGE(2),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the window's name property.
     * </pre>
     *
     * <code>WINDOW_NAME = 3;</code>
     */
    WINDOW_NAME(3),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the referrer property.
     * </pre>
     *
     * <code>REFERRER = 4;</code>
     */
    REFERRER(4),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing an input element.
     * </pre>
     *
     * <code>FORM_INPUT = 5;</code>
     */
    FORM_INPUT(5),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's cookies.
     * </pre>
     *
     * <code>COOKIE = 6;</code>
     */
    COOKIE(6),
    /**
     *
     *
     * <pre>
     * The attack comes from hijacking the post messaging mechanism.
     * </pre>
     *
     * <code>POST_MESSAGE = 7;</code>
     */
    POST_MESSAGE(7),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing parameters in the url.
     * </pre>
     *
     * <code>GET_PARAMETERS = 8;</code>
     */
    GET_PARAMETERS(8),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the fragment in the url.
     * </pre>
     *
     * <code>URL_FRAGMENT = 9;</code>
     */
    URL_FRAGMENT(9),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the HTML comments.
     * </pre>
     *
     * <code>HTML_COMMENT = 10;</code>
     */
    HTML_COMMENT(10),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the POST parameters.
     * </pre>
     *
     * <code>POST_PARAMETERS = 11;</code>
     */
    POST_PARAMETERS(11),
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the protocol.
     * </pre>
     *
     * <code>PROTOCOL = 12;</code>
     */
    PROTOCOL(12),
    /**
     *
     *
     * <pre>
     * The attack comes from the server side and is stored.
     * </pre>
     *
     * <code>STORED_XSS = 13;</code>
     */
    STORED_XSS(13),
    /**
     *
     *
     * <pre>
     * The attack is a Same-Origin Method Execution attack via a GET parameter.
     * </pre>
     *
     * <code>SAME_ORIGIN = 14;</code>
     */
    SAME_ORIGIN(14),
    /**
     *
     *
     * <pre>
     * The attack payload is received from a third-party host via a URL that is
     * user-controllable
     * </pre>
     *
     * <code>USER_CONTROLLABLE_URL = 15;</code>
     */
    USER_CONTROLLABLE_URL(15),
    UNRECOGNIZED(-1),
    ;

    /**
     *
     *
     * <pre>
     * Unknown attack vector.
     * </pre>
     *
     * <code>ATTACK_VECTOR_UNSPECIFIED = 0;</code>
     */
    public static final int ATTACK_VECTOR_UNSPECIFIED_VALUE = 0;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's localStorage.
     * </pre>
     *
     * <code>LOCAL_STORAGE = 1;</code>
     */
    public static final int LOCAL_STORAGE_VALUE = 1;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's sessionStorage.
     * </pre>
     *
     * <code>SESSION_STORAGE = 2;</code>
     */
    public static final int SESSION_STORAGE_VALUE = 2;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the window's name property.
     * </pre>
     *
     * <code>WINDOW_NAME = 3;</code>
     */
    public static final int WINDOW_NAME_VALUE = 3;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the referrer property.
     * </pre>
     *
     * <code>REFERRER = 4;</code>
     */
    public static final int REFERRER_VALUE = 4;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing an input element.
     * </pre>
     *
     * <code>FORM_INPUT = 5;</code>
     */
    public static final int FORM_INPUT_VALUE = 5;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the browser's cookies.
     * </pre>
     *
     * <code>COOKIE = 6;</code>
     */
    public static final int COOKIE_VALUE = 6;
    /**
     *
     *
     * <pre>
     * The attack comes from hijacking the post messaging mechanism.
     * </pre>
     *
     * <code>POST_MESSAGE = 7;</code>
     */
    public static final int POST_MESSAGE_VALUE = 7;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing parameters in the url.
     * </pre>
     *
     * <code>GET_PARAMETERS = 8;</code>
     */
    public static final int GET_PARAMETERS_VALUE = 8;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the fragment in the url.
     * </pre>
     *
     * <code>URL_FRAGMENT = 9;</code>
     */
    public static final int URL_FRAGMENT_VALUE = 9;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the HTML comments.
     * </pre>
     *
     * <code>HTML_COMMENT = 10;</code>
     */
    public static final int HTML_COMMENT_VALUE = 10;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the POST parameters.
     * </pre>
     *
     * <code>POST_PARAMETERS = 11;</code>
     */
    public static final int POST_PARAMETERS_VALUE = 11;
    /**
     *
     *
     * <pre>
     * The attack comes from fuzzing the protocol.
     * </pre>
     *
     * <code>PROTOCOL = 12;</code>
     */
    public static final int PROTOCOL_VALUE = 12;
    /**
     *
     *
     * <pre>
     * The attack comes from the server side and is stored.
     * </pre>
     *
     * <code>STORED_XSS = 13;</code>
     */
    public static final int STORED_XSS_VALUE = 13;
    /**
     *
     *
     * <pre>
     * The attack is a Same-Origin Method Execution attack via a GET parameter.
     * </pre>
     *
     * <code>SAME_ORIGIN = 14;</code>
     */
    public static final int SAME_ORIGIN_VALUE = 14;
    /**
     *
     *
     * <pre>
     * The attack payload is received from a third-party host via a URL that is
     * user-controllable
     * </pre>
     *
     * <code>USER_CONTROLLABLE_URL = 15;</code>
     */
    public static final int USER_CONTROLLABLE_URL_VALUE = 15;

    public final int getNumber() {
      if (this == UNRECOGNIZED) {
        throw new java.lang.IllegalArgumentException(
            "Can't get the number of an unknown enum value.");
      }
      return value;
    }

    /**
     * @param value The numeric wire value of the corresponding enum entry.
     * @return The enum associated with the given numeric wire value.
     * @deprecated Use {@link #forNumber(int)} instead.
     */
    @java.lang.Deprecated
    public static AttackVector valueOf(int value) {
      return forNumber(value);
    }

    /**
     * @param value The numeric wire value of the corresponding enum entry.
     * @return The enum associated with the given numeric wire value.
     */
    public static AttackVector forNumber(int value) {
      switch (value) {
        case 0:
          return ATTACK_VECTOR_UNSPECIFIED;
        case 1:
          return LOCAL_STORAGE;
        case 2:
          return SESSION_STORAGE;
        case 3:
          return WINDOW_NAME;
        case 4:
          return REFERRER;
        case 5:
          return FORM_INPUT;
        case 6:
          return COOKIE;
        case 7:
          return POST_MESSAGE;
        case 8:
          return GET_PARAMETERS;
        case 9:
          return URL_FRAGMENT;
        case 10:
          return HTML_COMMENT;
        case 11:
          return POST_PARAMETERS;
        case 12:
          return PROTOCOL;
        case 13:
          return STORED_XSS;
        case 14:
          return SAME_ORIGIN;
        case 15:
          return USER_CONTROLLABLE_URL;
        default:
          return null;
      }
    }

    public static com.google.protobuf.Internal.EnumLiteMap<AttackVector> internalGetValueMap() {
      return internalValueMap;
    }

    private static final com.google.protobuf.Internal.EnumLiteMap<AttackVector> internalValueMap =
        new com.google.protobuf.Internal.EnumLiteMap<AttackVector>() {
          public AttackVector findValueByNumber(int number) {
            return AttackVector.forNumber(number);
          }
        };

    public final com.google.protobuf.Descriptors.EnumValueDescriptor getValueDescriptor() {
      if (this == UNRECOGNIZED) {
        throw new java.lang.IllegalStateException(
            "Can't get the descriptor of an unrecognized enum value.");
      }
      return getDescriptor().getValues().get(ordinal());
    }

    public final com.google.protobuf.Descriptors.EnumDescriptor getDescriptorForType() {
      return getDescriptor();
    }

    public static final com.google.protobuf.Descriptors.EnumDescriptor getDescriptor() {
      return com.google.cloud.websecurityscanner.v1.Xss.getDescriptor().getEnumTypes().get(0);
    }

    private static final AttackVector[] VALUES = values();

    public static AttackVector valueOf(com.google.protobuf.Descriptors.EnumValueDescriptor desc) {
      if (desc.getType() != getDescriptor()) {
        throw new java.lang.IllegalArgumentException("EnumValueDescriptor is not for this type.");
      }
      if (desc.getIndex() == -1) {
        return UNRECOGNIZED;
      }
      return VALUES[desc.getIndex()];
    }

    private final int value;

    private AttackVector(int value) {
      this.value = value;
    }

    // @@protoc_insertion_point(enum_scope:google.cloud.websecurityscanner.v1.Xss.AttackVector)
  }

  public static final int STACK_TRACES_FIELD_NUMBER = 1;

  @SuppressWarnings("serial")
  private com.google.protobuf.LazyStringList stackTraces_;
  /**
   *
   *
   * <pre>
   * Stack traces leading to the point where the XSS occurred.
   * </pre>
   *
   * <code>repeated string stack_traces = 1;</code>
   *
   * @return A list containing the stackTraces.
   */
  public com.google.protobuf.ProtocolStringList getStackTracesList() {
    return stackTraces_;
  }
  /**
   *
   *
   * <pre>
   * Stack traces leading to the point where the XSS occurred.
   * </pre>
   *
   * <code>repeated string stack_traces = 1;</code>
   *
   * @return The count of stackTraces.
   */
  public int getStackTracesCount() {
    return stackTraces_.size();
  }
  /**
   *
   *
   * <pre>
   * Stack traces leading to the point where the XSS occurred.
   * </pre>
   *
   * <code>repeated string stack_traces = 1;</code>
   *
   * @param index The index of the element to return.
   * @return The stackTraces at the given index.
   */
  public java.lang.String getStackTraces(int index) {
    return stackTraces_.get(index);
  }
  /**
   *
   *
   * <pre>
   * Stack traces leading to the point where the XSS occurred.
   * </pre>
   *
   * <code>repeated string stack_traces = 1;</code>
   *
   * @param index The index of the value to return.
   * @return The bytes of the stackTraces at the given index.
   */
  public com.google.protobuf.ByteString getStackTracesBytes(int index) {
    return stackTraces_.getByteString(index);
  }

  public static final int ERROR_MESSAGE_FIELD_NUMBER = 2;

  @SuppressWarnings("serial")
  private volatile java.lang.Object errorMessage_ = "";
  /**
   *
   *
   * <pre>
   * An error message generated by a javascript breakage.
   * </pre>
   *
   * <code>string error_message = 2;</code>
   *
   * @return The errorMessage.
   */
  @java.lang.Override
  public java.lang.String getErrorMessage() {
    java.lang.Object ref = errorMessage_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      errorMessage_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * An error message generated by a javascript breakage.
   * </pre>
   *
   * <code>string error_message = 2;</code>
   *
   * @return The bytes for errorMessage.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getErrorMessageBytes() {
    java.lang.Object ref = errorMessage_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      errorMessage_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  public static final int ATTACK_VECTOR_FIELD_NUMBER = 3;
  private int attackVector_ = 0;
  /**
   *
   *
   * <pre>
   * The attack vector of the payload triggering this XSS.
   * </pre>
   *
   * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
   *
   * @return The enum numeric value on the wire for attackVector.
   */
  @java.lang.Override
  public int getAttackVectorValue() {
    return attackVector_;
  }
  /**
   *
   *
   * <pre>
   * The attack vector of the payload triggering this XSS.
   * </pre>
   *
   * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
   *
   * @return The attackVector.
   */
  @java.lang.Override
  public com.google.cloud.websecurityscanner.v1.Xss.AttackVector getAttackVector() {
    com.google.cloud.websecurityscanner.v1.Xss.AttackVector result =
        com.google.cloud.websecurityscanner.v1.Xss.AttackVector.forNumber(attackVector_);
    return result == null
        ? com.google.cloud.websecurityscanner.v1.Xss.AttackVector.UNRECOGNIZED
        : result;
  }

  public static final int STORED_XSS_SEEDING_URL_FIELD_NUMBER = 4;

  @SuppressWarnings("serial")
  private volatile java.lang.Object storedXssSeedingUrl_ = "";
  /**
   *
   *
   * <pre>
   * The reproduction url for the seeding POST request of a Stored XSS.
   * </pre>
   *
   * <code>string stored_xss_seeding_url = 4;</code>
   *
   * @return The storedXssSeedingUrl.
   */
  @java.lang.Override
  public java.lang.String getStoredXssSeedingUrl() {
    java.lang.Object ref = storedXssSeedingUrl_;
    if (ref instanceof java.lang.String) {
      return (java.lang.String) ref;
    } else {
      com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
      java.lang.String s = bs.toStringUtf8();
      storedXssSeedingUrl_ = s;
      return s;
    }
  }
  /**
   *
   *
   * <pre>
   * The reproduction url for the seeding POST request of a Stored XSS.
   * </pre>
   *
   * <code>string stored_xss_seeding_url = 4;</code>
   *
   * @return The bytes for storedXssSeedingUrl.
   */
  @java.lang.Override
  public com.google.protobuf.ByteString getStoredXssSeedingUrlBytes() {
    java.lang.Object ref = storedXssSeedingUrl_;
    if (ref instanceof java.lang.String) {
      com.google.protobuf.ByteString b =
          com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
      storedXssSeedingUrl_ = b;
      return b;
    } else {
      return (com.google.protobuf.ByteString) ref;
    }
  }

  private byte memoizedIsInitialized = -1;

  @java.lang.Override
  public final boolean isInitialized() {
    byte isInitialized = memoizedIsInitialized;
    if (isInitialized == 1) return true;
    if (isInitialized == 0) return false;

    memoizedIsInitialized = 1;
    return true;
  }

  @java.lang.Override
  public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
    for (int i = 0; i < stackTraces_.size(); i++) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 1, stackTraces_.getRaw(i));
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(errorMessage_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 2, errorMessage_);
    }
    if (attackVector_
        != com.google.cloud.websecurityscanner.v1.Xss.AttackVector.ATTACK_VECTOR_UNSPECIFIED
            .getNumber()) {
      output.writeEnum(3, attackVector_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(storedXssSeedingUrl_)) {
      com.google.protobuf.GeneratedMessageV3.writeString(output, 4, storedXssSeedingUrl_);
    }
    getUnknownFields().writeTo(output);
  }

  @java.lang.Override
  public int getSerializedSize() {
    int size = memoizedSize;
    if (size != -1) return size;

    size = 0;
    {
      int dataSize = 0;
      for (int i = 0; i < stackTraces_.size(); i++) {
        dataSize += computeStringSizeNoTag(stackTraces_.getRaw(i));
      }
      size += dataSize;
      size += 1 * getStackTracesList().size();
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(errorMessage_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, errorMessage_);
    }
    if (attackVector_
        != com.google.cloud.websecurityscanner.v1.Xss.AttackVector.ATTACK_VECTOR_UNSPECIFIED
            .getNumber()) {
      size += com.google.protobuf.CodedOutputStream.computeEnumSize(3, attackVector_);
    }
    if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(storedXssSeedingUrl_)) {
      size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, storedXssSeedingUrl_);
    }
    size += getUnknownFields().getSerializedSize();
    memoizedSize = size;
    return size;
  }

  @java.lang.Override
  public boolean equals(final java.lang.Object obj) {
    if (obj == this) {
      return true;
    }
    if (!(obj instanceof com.google.cloud.websecurityscanner.v1.Xss)) {
      return super.equals(obj);
    }
    com.google.cloud.websecurityscanner.v1.Xss other =
        (com.google.cloud.websecurityscanner.v1.Xss) obj;

    if (!getStackTracesList().equals(other.getStackTracesList())) return false;
    if (!getErrorMessage().equals(other.getErrorMessage())) return false;
    if (attackVector_ != other.attackVector_) return false;
    if (!getStoredXssSeedingUrl().equals(other.getStoredXssSeedingUrl())) return false;
    if (!getUnknownFields().equals(other.getUnknownFields())) return false;
    return true;
  }

  @java.lang.Override
  public int hashCode() {
    if (memoizedHashCode != 0) {
      return memoizedHashCode;
    }
    int hash = 41;
    hash = (19 * hash) + getDescriptor().hashCode();
    if (getStackTracesCount() > 0) {
      hash = (37 * hash) + STACK_TRACES_FIELD_NUMBER;
      hash = (53 * hash) + getStackTracesList().hashCode();
    }
    hash = (37 * hash) + ERROR_MESSAGE_FIELD_NUMBER;
    hash = (53 * hash) + getErrorMessage().hashCode();
    hash = (37 * hash) + ATTACK_VECTOR_FIELD_NUMBER;
    hash = (53 * hash) + attackVector_;
    hash = (37 * hash) + STORED_XSS_SEEDING_URL_FIELD_NUMBER;
    hash = (53 * hash) + getStoredXssSeedingUrl().hashCode();
    hash = (29 * hash) + getUnknownFields().hashCode();
    memoizedHashCode = hash;
    return hash;
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(java.nio.ByteBuffer data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      com.google.protobuf.ByteString data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      com.google.protobuf.ByteString data,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(byte[] data)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws com.google.protobuf.InvalidProtocolBufferException {
    return PARSER.parseFrom(data, extensionRegistry);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(java.io.InputStream input)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
        PARSER, input, extensionRegistry);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseDelimitedFrom(
      java.io.InputStream input) throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseDelimitedFrom(
      java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
        PARSER, input, extensionRegistry);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      com.google.protobuf.CodedInputStream input) throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
  }

  public static com.google.cloud.websecurityscanner.v1.Xss parseFrom(
      com.google.protobuf.CodedInputStream input,
      com.google.protobuf.ExtensionRegistryLite extensionRegistry)
      throws java.io.IOException {
    return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
        PARSER, input, extensionRegistry);
  }

  @java.lang.Override
  public Builder newBuilderForType() {
    return newBuilder();
  }

  public static Builder newBuilder() {
    return DEFAULT_INSTANCE.toBuilder();
  }

  public static Builder newBuilder(com.google.cloud.websecurityscanner.v1.Xss prototype) {
    return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
  }

  @java.lang.Override
  public Builder toBuilder() {
    return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
  }

  @java.lang.Override
  protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
    Builder builder = new Builder(parent);
    return builder;
  }
  /**
   *
   *
   * <pre>
   * Information reported for an XSS.
   * </pre>
   *
   * Protobuf type {@code google.cloud.websecurityscanner.v1.Xss}
   */
  public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder<Builder>
      implements
      // @@protoc_insertion_point(builder_implements:google.cloud.websecurityscanner.v1.Xss)
      com.google.cloud.websecurityscanner.v1.XssOrBuilder {
    public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
      return com.google.cloud.websecurityscanner.v1.FindingAddonProto
          .internal_static_google_cloud_websecurityscanner_v1_Xss_descriptor;
    }

    @java.lang.Override
    protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
        internalGetFieldAccessorTable() {
      return com.google.cloud.websecurityscanner.v1.FindingAddonProto
          .internal_static_google_cloud_websecurityscanner_v1_Xss_fieldAccessorTable
          .ensureFieldAccessorsInitialized(
              com.google.cloud.websecurityscanner.v1.Xss.class,
              com.google.cloud.websecurityscanner.v1.Xss.Builder.class);
    }

    // Construct using com.google.cloud.websecurityscanner.v1.Xss.newBuilder()
    private Builder() {}

    private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
      super(parent);
    }

    @java.lang.Override
    public Builder clear() {
      super.clear();
      bitField0_ = 0;
      stackTraces_ = com.google.protobuf.LazyStringArrayList.EMPTY;
      bitField0_ = (bitField0_ & ~0x00000001);
      errorMessage_ = "";
      attackVector_ = 0;
      storedXssSeedingUrl_ = "";
      return this;
    }

    @java.lang.Override
    public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() {
      return com.google.cloud.websecurityscanner.v1.FindingAddonProto
          .internal_static_google_cloud_websecurityscanner_v1_Xss_descriptor;
    }

    @java.lang.Override
    public com.google.cloud.websecurityscanner.v1.Xss getDefaultInstanceForType() {
      return com.google.cloud.websecurityscanner.v1.Xss.getDefaultInstance();
    }

    @java.lang.Override
    public com.google.cloud.websecurityscanner.v1.Xss build() {
      com.google.cloud.websecurityscanner.v1.Xss result = buildPartial();
      if (!result.isInitialized()) {
        throw newUninitializedMessageException(result);
      }
      return result;
    }

    @java.lang.Override
    public com.google.cloud.websecurityscanner.v1.Xss buildPartial() {
      com.google.cloud.websecurityscanner.v1.Xss result =
          new com.google.cloud.websecurityscanner.v1.Xss(this);
      buildPartialRepeatedFields(result);
      if (bitField0_ != 0) {
        buildPartial0(result);
      }
      onBuilt();
      return result;
    }

    private void buildPartialRepeatedFields(com.google.cloud.websecurityscanner.v1.Xss result) {
      if (((bitField0_ & 0x00000001) != 0)) {
        stackTraces_ = stackTraces_.getUnmodifiableView();
        bitField0_ = (bitField0_ & ~0x00000001);
      }
      result.stackTraces_ = stackTraces_;
    }

    private void buildPartial0(com.google.cloud.websecurityscanner.v1.Xss result) {
      int from_bitField0_ = bitField0_;
      if (((from_bitField0_ & 0x00000002) != 0)) {
        result.errorMessage_ = errorMessage_;
      }
      if (((from_bitField0_ & 0x00000004) != 0)) {
        result.attackVector_ = attackVector_;
      }
      if (((from_bitField0_ & 0x00000008) != 0)) {
        result.storedXssSeedingUrl_ = storedXssSeedingUrl_;
      }
    }

    @java.lang.Override
    public Builder clone() {
      return super.clone();
    }

    @java.lang.Override
    public Builder setField(
        com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
      return super.setField(field, value);
    }

    @java.lang.Override
    public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) {
      return super.clearField(field);
    }

    @java.lang.Override
    public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) {
      return super.clearOneof(oneof);
    }

    @java.lang.Override
    public Builder setRepeatedField(
        com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) {
      return super.setRepeatedField(field, index, value);
    }

    @java.lang.Override
    public Builder addRepeatedField(
        com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
      return super.addRepeatedField(field, value);
    }

    @java.lang.Override
    public Builder mergeFrom(com.google.protobuf.Message other) {
      if (other instanceof com.google.cloud.websecurityscanner.v1.Xss) {
        return mergeFrom((com.google.cloud.websecurityscanner.v1.Xss) other);
      } else {
        super.mergeFrom(other);
        return this;
      }
    }

    public Builder mergeFrom(com.google.cloud.websecurityscanner.v1.Xss other) {
      if (other == com.google.cloud.websecurityscanner.v1.Xss.getDefaultInstance()) return this;
      if (!other.stackTraces_.isEmpty()) {
        if (stackTraces_.isEmpty()) {
          stackTraces_ = other.stackTraces_;
          bitField0_ = (bitField0_ & ~0x00000001);
        } else {
          ensureStackTracesIsMutable();
          stackTraces_.addAll(other.stackTraces_);
        }
        onChanged();
      }
      if (!other.getErrorMessage().isEmpty()) {
        errorMessage_ = other.errorMessage_;
        bitField0_ |= 0x00000002;
        onChanged();
      }
      if (other.attackVector_ != 0) {
        setAttackVectorValue(other.getAttackVectorValue());
      }
      if (!other.getStoredXssSeedingUrl().isEmpty()) {
        storedXssSeedingUrl_ = other.storedXssSeedingUrl_;
        bitField0_ |= 0x00000008;
        onChanged();
      }
      this.mergeUnknownFields(other.getUnknownFields());
      onChanged();
      return this;
    }

    @java.lang.Override
    public final boolean isInitialized() {
      return true;
    }

    @java.lang.Override
    public Builder mergeFrom(
        com.google.protobuf.CodedInputStream input,
        com.google.protobuf.ExtensionRegistryLite extensionRegistry)
        throws java.io.IOException {
      if (extensionRegistry == null) {
        throw new java.lang.NullPointerException();
      }
      try {
        boolean done = false;
        while (!done) {
          int tag = input.readTag();
          switch (tag) {
            case 0:
              done = true;
              break;
            case 10:
              {
                java.lang.String s = input.readStringRequireUtf8();
                ensureStackTracesIsMutable();
                stackTraces_.add(s);
                break;
              } // case 10
            case 18:
              {
                errorMessage_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000002;
                break;
              } // case 18
            case 24:
              {
                attackVector_ = input.readEnum();
                bitField0_ |= 0x00000004;
                break;
              } // case 24
            case 34:
              {
                storedXssSeedingUrl_ = input.readStringRequireUtf8();
                bitField0_ |= 0x00000008;
                break;
              } // case 34
            default:
              {
                if (!super.parseUnknownField(input, extensionRegistry, tag)) {
                  done = true; // was an endgroup tag
                }
                break;
              } // default:
          } // switch (tag)
        } // while (!done)
      } catch (com.google.protobuf.InvalidProtocolBufferException e) {
        throw e.unwrapIOException();
      } finally {
        onChanged();
      } // finally
      return this;
    }

    private int bitField0_;

    private com.google.protobuf.LazyStringList stackTraces_ =
        com.google.protobuf.LazyStringArrayList.EMPTY;

    private void ensureStackTracesIsMutable() {
      if (!((bitField0_ & 0x00000001) != 0)) {
        stackTraces_ = new com.google.protobuf.LazyStringArrayList(stackTraces_);
        bitField0_ |= 0x00000001;
      }
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @return A list containing the stackTraces.
     */
    public com.google.protobuf.ProtocolStringList getStackTracesList() {
      return stackTraces_.getUnmodifiableView();
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @return The count of stackTraces.
     */
    public int getStackTracesCount() {
      return stackTraces_.size();
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param index The index of the element to return.
     * @return The stackTraces at the given index.
     */
    public java.lang.String getStackTraces(int index) {
      return stackTraces_.get(index);
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param index The index of the value to return.
     * @return The bytes of the stackTraces at the given index.
     */
    public com.google.protobuf.ByteString getStackTracesBytes(int index) {
      return stackTraces_.getByteString(index);
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param index The index to set the value at.
     * @param value The stackTraces to set.
     * @return This builder for chaining.
     */
    public Builder setStackTraces(int index, java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      ensureStackTracesIsMutable();
      stackTraces_.set(index, value);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param value The stackTraces to add.
     * @return This builder for chaining.
     */
    public Builder addStackTraces(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      ensureStackTracesIsMutable();
      stackTraces_.add(value);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param values The stackTraces to add.
     * @return This builder for chaining.
     */
    public Builder addAllStackTraces(java.lang.Iterable<java.lang.String> values) {
      ensureStackTracesIsMutable();
      com.google.protobuf.AbstractMessageLite.Builder.addAll(values, stackTraces_);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearStackTraces() {
      stackTraces_ = com.google.protobuf.LazyStringArrayList.EMPTY;
      bitField0_ = (bitField0_ & ~0x00000001);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * Stack traces leading to the point where the XSS occurred.
     * </pre>
     *
     * <code>repeated string stack_traces = 1;</code>
     *
     * @param value The bytes of the stackTraces to add.
     * @return This builder for chaining.
     */
    public Builder addStackTracesBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      ensureStackTracesIsMutable();
      stackTraces_.add(value);
      onChanged();
      return this;
    }

    private java.lang.Object errorMessage_ = "";
    /**
     *
     *
     * <pre>
     * An error message generated by a javascript breakage.
     * </pre>
     *
     * <code>string error_message = 2;</code>
     *
     * @return The errorMessage.
     */
    public java.lang.String getErrorMessage() {
      java.lang.Object ref = errorMessage_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        errorMessage_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * An error message generated by a javascript breakage.
     * </pre>
     *
     * <code>string error_message = 2;</code>
     *
     * @return The bytes for errorMessage.
     */
    public com.google.protobuf.ByteString getErrorMessageBytes() {
      java.lang.Object ref = errorMessage_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        errorMessage_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * An error message generated by a javascript breakage.
     * </pre>
     *
     * <code>string error_message = 2;</code>
     *
     * @param value The errorMessage to set.
     * @return This builder for chaining.
     */
    public Builder setErrorMessage(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      errorMessage_ = value;
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * An error message generated by a javascript breakage.
     * </pre>
     *
     * <code>string error_message = 2;</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearErrorMessage() {
      errorMessage_ = getDefaultInstance().getErrorMessage();
      bitField0_ = (bitField0_ & ~0x00000002);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * An error message generated by a javascript breakage.
     * </pre>
     *
     * <code>string error_message = 2;</code>
     *
     * @param value The bytes for errorMessage to set.
     * @return This builder for chaining.
     */
    public Builder setErrorMessageBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      errorMessage_ = value;
      bitField0_ |= 0x00000002;
      onChanged();
      return this;
    }

    private int attackVector_ = 0;
    /**
     *
     *
     * <pre>
     * The attack vector of the payload triggering this XSS.
     * </pre>
     *
     * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
     *
     * @return The enum numeric value on the wire for attackVector.
     */
    @java.lang.Override
    public int getAttackVectorValue() {
      return attackVector_;
    }
    /**
     *
     *
     * <pre>
     * The attack vector of the payload triggering this XSS.
     * </pre>
     *
     * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
     *
     * @param value The enum numeric value on the wire for attackVector to set.
     * @return This builder for chaining.
     */
    public Builder setAttackVectorValue(int value) {
      attackVector_ = value;
      bitField0_ |= 0x00000004;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * The attack vector of the payload triggering this XSS.
     * </pre>
     *
     * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
     *
     * @return The attackVector.
     */
    @java.lang.Override
    public com.google.cloud.websecurityscanner.v1.Xss.AttackVector getAttackVector() {
      com.google.cloud.websecurityscanner.v1.Xss.AttackVector result =
          com.google.cloud.websecurityscanner.v1.Xss.AttackVector.forNumber(attackVector_);
      return result == null
          ? com.google.cloud.websecurityscanner.v1.Xss.AttackVector.UNRECOGNIZED
          : result;
    }
    /**
     *
     *
     * <pre>
     * The attack vector of the payload triggering this XSS.
     * </pre>
     *
     * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
     *
     * @param value The attackVector to set.
     * @return This builder for chaining.
     */
    public Builder setAttackVector(com.google.cloud.websecurityscanner.v1.Xss.AttackVector value) {
      if (value == null) {
        throw new NullPointerException();
      }
      bitField0_ |= 0x00000004;
      attackVector_ = value.getNumber();
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * The attack vector of the payload triggering this XSS.
     * </pre>
     *
     * <code>.google.cloud.websecurityscanner.v1.Xss.AttackVector attack_vector = 3;</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearAttackVector() {
      bitField0_ = (bitField0_ & ~0x00000004);
      attackVector_ = 0;
      onChanged();
      return this;
    }

    private java.lang.Object storedXssSeedingUrl_ = "";
    /**
     *
     *
     * <pre>
     * The reproduction url for the seeding POST request of a Stored XSS.
     * </pre>
     *
     * <code>string stored_xss_seeding_url = 4;</code>
     *
     * @return The storedXssSeedingUrl.
     */
    public java.lang.String getStoredXssSeedingUrl() {
      java.lang.Object ref = storedXssSeedingUrl_;
      if (!(ref instanceof java.lang.String)) {
        com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
        java.lang.String s = bs.toStringUtf8();
        storedXssSeedingUrl_ = s;
        return s;
      } else {
        return (java.lang.String) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * The reproduction url for the seeding POST request of a Stored XSS.
     * </pre>
     *
     * <code>string stored_xss_seeding_url = 4;</code>
     *
     * @return The bytes for storedXssSeedingUrl.
     */
    public com.google.protobuf.ByteString getStoredXssSeedingUrlBytes() {
      java.lang.Object ref = storedXssSeedingUrl_;
      if (ref instanceof String) {
        com.google.protobuf.ByteString b =
            com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
        storedXssSeedingUrl_ = b;
        return b;
      } else {
        return (com.google.protobuf.ByteString) ref;
      }
    }
    /**
     *
     *
     * <pre>
     * The reproduction url for the seeding POST request of a Stored XSS.
     * </pre>
     *
     * <code>string stored_xss_seeding_url = 4;</code>
     *
     * @param value The storedXssSeedingUrl to set.
     * @return This builder for chaining.
     */
    public Builder setStoredXssSeedingUrl(java.lang.String value) {
      if (value == null) {
        throw new NullPointerException();
      }
      storedXssSeedingUrl_ = value;
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * The reproduction url for the seeding POST request of a Stored XSS.
     * </pre>
     *
     * <code>string stored_xss_seeding_url = 4;</code>
     *
     * @return This builder for chaining.
     */
    public Builder clearStoredXssSeedingUrl() {
      storedXssSeedingUrl_ = getDefaultInstance().getStoredXssSeedingUrl();
      bitField0_ = (bitField0_ & ~0x00000008);
      onChanged();
      return this;
    }
    /**
     *
     *
     * <pre>
     * The reproduction url for the seeding POST request of a Stored XSS.
     * </pre>
     *
     * <code>string stored_xss_seeding_url = 4;</code>
     *
     * @param value The bytes for storedXssSeedingUrl to set.
     * @return This builder for chaining.
     */
    public Builder setStoredXssSeedingUrlBytes(com.google.protobuf.ByteString value) {
      if (value == null) {
        throw new NullPointerException();
      }
      checkByteStringIsUtf8(value);
      storedXssSeedingUrl_ = value;
      bitField0_ |= 0x00000008;
      onChanged();
      return this;
    }

    @java.lang.Override
    public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
      return super.setUnknownFields(unknownFields);
    }

    @java.lang.Override
    public final Builder mergeUnknownFields(
        final com.google.protobuf.UnknownFieldSet unknownFields) {
      return super.mergeUnknownFields(unknownFields);
    }

    // @@protoc_insertion_point(builder_scope:google.cloud.websecurityscanner.v1.Xss)
  }

  // @@protoc_insertion_point(class_scope:google.cloud.websecurityscanner.v1.Xss)
  private static final com.google.cloud.websecurityscanner.v1.Xss DEFAULT_INSTANCE;

  static {
    DEFAULT_INSTANCE = new com.google.cloud.websecurityscanner.v1.Xss();
  }

  public static com.google.cloud.websecurityscanner.v1.Xss getDefaultInstance() {
    return DEFAULT_INSTANCE;
  }

  private static final com.google.protobuf.Parser<Xss> PARSER =
      new com.google.protobuf.AbstractParser<Xss>() {
        @java.lang.Override
        public Xss parsePartialFrom(
            com.google.protobuf.CodedInputStream input,
            com.google.protobuf.ExtensionRegistryLite extensionRegistry)
            throws com.google.protobuf.InvalidProtocolBufferException {
          Builder builder = newBuilder();
          try {
            builder.mergeFrom(input, extensionRegistry);
          } catch (com.google.protobuf.InvalidProtocolBufferException e) {
            throw e.setUnfinishedMessage(builder.buildPartial());
          } catch (com.google.protobuf.UninitializedMessageException e) {
            throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
          } catch (java.io.IOException e) {
            throw new com.google.protobuf.InvalidProtocolBufferException(e)
                .setUnfinishedMessage(builder.buildPartial());
          }
          return builder.buildPartial();
        }
      };

  public static com.google.protobuf.Parser<Xss> parser() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.protobuf.Parser<Xss> getParserForType() {
    return PARSER;
  }

  @java.lang.Override
  public com.google.cloud.websecurityscanner.v1.Xss getDefaultInstanceForType() {
    return DEFAULT_INSTANCE;
  }
}
