/* * Copyright 2019 The Grafeas Authors. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // Generated by the protocol buffer compiler. DO NOT EDIT! // source: grafeas/v1/vulnerability.proto package io.grafeas.v1; public interface VulnerabilityNoteOrBuilder extends // @@protoc_insertion_point(interface_extends:grafeas.v1.VulnerabilityNote) com.google.protobuf.MessageOrBuilder { /** * * *
* The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 * where 0 indicates low severity and 10 indicates high severity. ** *
float cvss_score = 1;
*
* @return The cvssScore.
*/
float getCvssScore();
/**
*
*
* * The note provider assigned severity of this vulnerability. ** *
.grafeas.v1.Severity severity = 2;
*
* @return The enum numeric value on the wire for severity.
*/
int getSeverityValue();
/**
*
*
* * The note provider assigned severity of this vulnerability. ** *
.grafeas.v1.Severity severity = 2;
*
* @return The severity.
*/
io.grafeas.v1.Severity getSeverity();
/**
*
*
* * Details of all known distros and packages affected by this vulnerability. ** *
repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;
*/
java.util.List* Details of all known distros and packages affected by this vulnerability. ** *
repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;
*/
io.grafeas.v1.VulnerabilityNote.Detail getDetails(int index);
/**
*
*
* * Details of all known distros and packages affected by this vulnerability. ** *
repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;
*/
int getDetailsCount();
/**
*
*
* * Details of all known distros and packages affected by this vulnerability. ** *
repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;
*/
java.util.List extends io.grafeas.v1.VulnerabilityNote.DetailOrBuilder>
getDetailsOrBuilderList();
/**
*
*
* * Details of all known distros and packages affected by this vulnerability. ** *
repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;
*/
io.grafeas.v1.VulnerabilityNote.DetailOrBuilder getDetailsOrBuilder(int index);
/**
*
*
* * The full description of the CVSSv3 for this vulnerability. ** *
.grafeas.v1.CVSSv3 cvss_v3 = 4;
*
* @return Whether the cvssV3 field is set.
*/
boolean hasCvssV3();
/**
*
*
* * The full description of the CVSSv3 for this vulnerability. ** *
.grafeas.v1.CVSSv3 cvss_v3 = 4;
*
* @return The cvssV3.
*/
io.grafeas.v1.CVSSv3 getCvssV3();
/**
*
*
* * The full description of the CVSSv3 for this vulnerability. ** *
.grafeas.v1.CVSSv3 cvss_v3 = 4;
*/
io.grafeas.v1.CVSSv3OrBuilder getCvssV3OrBuilder();
/**
*
*
* * Windows details get their own format because the information format and * model don't match a normal detail. Specifically Windows updates are done as * patches, thus Windows vulnerabilities really are a missing package, rather * than a package being at an incorrect version. ** *
repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;
*/
java.util.List* Windows details get their own format because the information format and * model don't match a normal detail. Specifically Windows updates are done as * patches, thus Windows vulnerabilities really are a missing package, rather * than a package being at an incorrect version. ** *
repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;
*/
io.grafeas.v1.VulnerabilityNote.WindowsDetail getWindowsDetails(int index);
/**
*
*
* * Windows details get their own format because the information format and * model don't match a normal detail. Specifically Windows updates are done as * patches, thus Windows vulnerabilities really are a missing package, rather * than a package being at an incorrect version. ** *
repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;
*/
int getWindowsDetailsCount();
/**
*
*
* * Windows details get their own format because the information format and * model don't match a normal detail. Specifically Windows updates are done as * patches, thus Windows vulnerabilities really are a missing package, rather * than a package being at an incorrect version. ** *
repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;
*/
java.util.List extends io.grafeas.v1.VulnerabilityNote.WindowsDetailOrBuilder>
getWindowsDetailsOrBuilderList();
/**
*
*
* * Windows details get their own format because the information format and * model don't match a normal detail. Specifically Windows updates are done as * patches, thus Windows vulnerabilities really are a missing package, rather * than a package being at an incorrect version. ** *
repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;
*/
io.grafeas.v1.VulnerabilityNote.WindowsDetailOrBuilder getWindowsDetailsOrBuilder(int index);
/**
*
*
* * The time this information was last changed at the source. This is an * upstream timestamp from the underlying information source - e.g. Ubuntu * security tracker. ** *
.google.protobuf.Timestamp source_update_time = 6;
*
* @return Whether the sourceUpdateTime field is set.
*/
boolean hasSourceUpdateTime();
/**
*
*
* * The time this information was last changed at the source. This is an * upstream timestamp from the underlying information source - e.g. Ubuntu * security tracker. ** *
.google.protobuf.Timestamp source_update_time = 6;
*
* @return The sourceUpdateTime.
*/
com.google.protobuf.Timestamp getSourceUpdateTime();
/**
*
*
* * The time this information was last changed at the source. This is an * upstream timestamp from the underlying information source - e.g. Ubuntu * security tracker. ** *
.google.protobuf.Timestamp source_update_time = 6;
*/
com.google.protobuf.TimestampOrBuilder getSourceUpdateTimeOrBuilder();
/**
*
*
* * CVSS version used to populate cvss_score and severity. ** *
.grafeas.v1.CVSSVersion cvss_version = 7;
*
* @return The enum numeric value on the wire for cvssVersion.
*/
int getCvssVersionValue();
/**
*
*
* * CVSS version used to populate cvss_score and severity. ** *
.grafeas.v1.CVSSVersion cvss_version = 7;
*
* @return The cvssVersion.
*/
io.grafeas.v1.CVSSVersion getCvssVersion();
/**
*
*
* * The full description of the v2 CVSS for this vulnerability. ** *
.grafeas.v1.CVSS cvss_v2 = 8;
*
* @return Whether the cvssV2 field is set.
*/
boolean hasCvssV2();
/**
*
*
* * The full description of the v2 CVSS for this vulnerability. ** *
.grafeas.v1.CVSS cvss_v2 = 8;
*
* @return The cvssV2.
*/
io.grafeas.v1.CVSS getCvssV2();
/**
*
*
* * The full description of the v2 CVSS for this vulnerability. ** *
.grafeas.v1.CVSS cvss_v2 = 8;
*/
io.grafeas.v1.CVSSOrBuilder getCvssV2OrBuilder();
}