/* * Copyright 2019 The Grafeas Authors. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // Generated by the protocol buffer compiler. DO NOT EDIT! // source: grafeas/v1/vulnerability.proto package io.grafeas.v1; public interface VulnerabilityNoteOrBuilder extends // @@protoc_insertion_point(interface_extends:grafeas.v1.VulnerabilityNote) com.google.protobuf.MessageOrBuilder { /** * * *
   * The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10
   * where 0 indicates low severity and 10 indicates high severity.
   * 
* * float cvss_score = 1; * * @return The cvssScore. */ float getCvssScore(); /** * * *
   * The note provider assigned severity of this vulnerability.
   * 
* * .grafeas.v1.Severity severity = 2; * * @return The enum numeric value on the wire for severity. */ int getSeverityValue(); /** * * *
   * The note provider assigned severity of this vulnerability.
   * 
* * .grafeas.v1.Severity severity = 2; * * @return The severity. */ io.grafeas.v1.Severity getSeverity(); /** * * *
   * Details of all known distros and packages affected by this vulnerability.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.Detail details = 3; */ java.util.List getDetailsList(); /** * * *
   * Details of all known distros and packages affected by this vulnerability.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.Detail details = 3; */ io.grafeas.v1.VulnerabilityNote.Detail getDetails(int index); /** * * *
   * Details of all known distros and packages affected by this vulnerability.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.Detail details = 3; */ int getDetailsCount(); /** * * *
   * Details of all known distros and packages affected by this vulnerability.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.Detail details = 3; */ java.util.List getDetailsOrBuilderList(); /** * * *
   * Details of all known distros and packages affected by this vulnerability.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.Detail details = 3; */ io.grafeas.v1.VulnerabilityNote.DetailOrBuilder getDetailsOrBuilder(int index); /** * * *
   * The full description of the CVSSv3 for this vulnerability.
   * 
* * .grafeas.v1.CVSSv3 cvss_v3 = 4; * * @return Whether the cvssV3 field is set. */ boolean hasCvssV3(); /** * * *
   * The full description of the CVSSv3 for this vulnerability.
   * 
* * .grafeas.v1.CVSSv3 cvss_v3 = 4; * * @return The cvssV3. */ io.grafeas.v1.CVSSv3 getCvssV3(); /** * * *
   * The full description of the CVSSv3 for this vulnerability.
   * 
* * .grafeas.v1.CVSSv3 cvss_v3 = 4; */ io.grafeas.v1.CVSSv3OrBuilder getCvssV3OrBuilder(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5; */ java.util.List getWindowsDetailsList(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5; */ io.grafeas.v1.VulnerabilityNote.WindowsDetail getWindowsDetails(int index); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5; */ int getWindowsDetailsCount(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5; */ java.util.List getWindowsDetailsOrBuilderList(); /** * * *
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * 
* * repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5; */ io.grafeas.v1.VulnerabilityNote.WindowsDetailOrBuilder getWindowsDetailsOrBuilder(int index); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; * * @return Whether the sourceUpdateTime field is set. */ boolean hasSourceUpdateTime(); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; * * @return The sourceUpdateTime. */ com.google.protobuf.Timestamp getSourceUpdateTime(); /** * * *
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * 
* * .google.protobuf.Timestamp source_update_time = 6; */ com.google.protobuf.TimestampOrBuilder getSourceUpdateTimeOrBuilder(); /** * * *
   * CVSS version used to populate cvss_score and severity.
   * 
* * .grafeas.v1.CVSSVersion cvss_version = 7; * * @return The enum numeric value on the wire for cvssVersion. */ int getCvssVersionValue(); /** * * *
   * CVSS version used to populate cvss_score and severity.
   * 
* * .grafeas.v1.CVSSVersion cvss_version = 7; * * @return The cvssVersion. */ io.grafeas.v1.CVSSVersion getCvssVersion(); /** * * *
   * The full description of the v2 CVSS for this vulnerability.
   * 
* * .grafeas.v1.CVSS cvss_v2 = 8; * * @return Whether the cvssV2 field is set. */ boolean hasCvssV2(); /** * * *
   * The full description of the v2 CVSS for this vulnerability.
   * 
* * .grafeas.v1.CVSS cvss_v2 = 8; * * @return The cvssV2. */ io.grafeas.v1.CVSS getCvssV2(); /** * * *
   * The full description of the v2 CVSS for this vulnerability.
   * 
* * .grafeas.v1.CVSS cvss_v2 = 8; */ io.grafeas.v1.CVSSOrBuilder getCvssV2OrBuilder(); }