blob: a7da302f2bafd2cc194078dec26cc067ab4caae8 [file] [log] [blame]
// Code generated by protoc-gen-go. DO NOT EDIT.
// source: grafeas/v1/vulnerability.proto
package grafeas
import (
fmt "fmt"
math "math"
proto "github.com/golang/protobuf/proto"
)
// Reference imports to suppress errors if they are not otherwise used.
var _ = proto.Marshal
var _ = fmt.Errorf
var _ = math.Inf
// This is a compile-time assertion to ensure that this generated file
// is compatible with the proto package it is being compiled against.
// A compilation error at this line likely means your copy of the
// proto package needs to be updated.
const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
// Note provider assigned severity/impact ranking.
type Severity int32
const (
// Unknown.
Severity_SEVERITY_UNSPECIFIED Severity = 0
// Minimal severity.
Severity_MINIMAL Severity = 1
// Low severity.
Severity_LOW Severity = 2
// Medium severity.
Severity_MEDIUM Severity = 3
// High severity.
Severity_HIGH Severity = 4
// Critical severity.
Severity_CRITICAL Severity = 5
)
var Severity_name = map[int32]string{
0: "SEVERITY_UNSPECIFIED",
1: "MINIMAL",
2: "LOW",
3: "MEDIUM",
4: "HIGH",
5: "CRITICAL",
}
var Severity_value = map[string]int32{
"SEVERITY_UNSPECIFIED": 0,
"MINIMAL": 1,
"LOW": 2,
"MEDIUM": 3,
"HIGH": 4,
"CRITICAL": 5,
}
func (x Severity) String() string {
return proto.EnumName(Severity_name, int32(x))
}
func (Severity) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{0}
}
// A security vulnerability that can be found in resources.
type VulnerabilityNote struct {
// The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10
// where 0 indicates low severity and 10 indicates high severity.
CvssScore float32 `protobuf:"fixed32,1,opt,name=cvss_score,json=cvssScore,proto3" json:"cvss_score,omitempty"`
// The note provider assigned severity of this vulnerability.
Severity Severity `protobuf:"varint,2,opt,name=severity,proto3,enum=grafeas.v1.Severity" json:"severity,omitempty"`
// Details of all known distros and packages affected by this vulnerability.
Details []*VulnerabilityNote_Detail `protobuf:"bytes,3,rep,name=details,proto3" json:"details,omitempty"`
// The full description of the CVSSv3 for this vulnerability.
CvssV3 *CVSSv3 `protobuf:"bytes,4,opt,name=cvss_v3,json=cvssV3,proto3" json:"cvss_v3,omitempty"`
// Windows details get their own format because the information format and
// model don't match a normal detail. Specifically Windows updates are done as
// patches, thus Windows vulnerabilities really are a missing package, rather
// than a package being at an incorrect version.
WindowsDetails []*VulnerabilityNote_WindowsDetail `protobuf:"bytes,5,rep,name=windows_details,json=windowsDetails,proto3" json:"windows_details,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityNote) Reset() { *m = VulnerabilityNote{} }
func (m *VulnerabilityNote) String() string { return proto.CompactTextString(m) }
func (*VulnerabilityNote) ProtoMessage() {}
func (*VulnerabilityNote) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{0}
}
func (m *VulnerabilityNote) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityNote.Unmarshal(m, b)
}
func (m *VulnerabilityNote) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityNote.Marshal(b, m, deterministic)
}
func (m *VulnerabilityNote) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityNote.Merge(m, src)
}
func (m *VulnerabilityNote) XXX_Size() int {
return xxx_messageInfo_VulnerabilityNote.Size(m)
}
func (m *VulnerabilityNote) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityNote.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityNote proto.InternalMessageInfo
func (m *VulnerabilityNote) GetCvssScore() float32 {
if m != nil {
return m.CvssScore
}
return 0
}
func (m *VulnerabilityNote) GetSeverity() Severity {
if m != nil {
return m.Severity
}
return Severity_SEVERITY_UNSPECIFIED
}
func (m *VulnerabilityNote) GetDetails() []*VulnerabilityNote_Detail {
if m != nil {
return m.Details
}
return nil
}
func (m *VulnerabilityNote) GetCvssV3() *CVSSv3 {
if m != nil {
return m.CvssV3
}
return nil
}
func (m *VulnerabilityNote) GetWindowsDetails() []*VulnerabilityNote_WindowsDetail {
if m != nil {
return m.WindowsDetails
}
return nil
}
// A detail for a distro and package affected by this vulnerability and its
// associated fix (if one is available).
type VulnerabilityNote_Detail struct {
// The distro assigned severity of this vulnerability.
SeverityName string `protobuf:"bytes,1,opt,name=severity_name,json=severityName,proto3" json:"severity_name,omitempty"`
// A vendor-specific description of this vulnerability.
Description string `protobuf:"bytes,2,opt,name=description,proto3" json:"description,omitempty"`
// The type of package; whether native or non native (e.g., ruby gems,
// node.js packages, etc.).
PackageType string `protobuf:"bytes,3,opt,name=package_type,json=packageType,proto3" json:"package_type,omitempty"`
// Required. The [CPE URI](https://cpe.mitre.org/specification/) this
// vulnerability affects.
AffectedCpeUri string `protobuf:"bytes,4,opt,name=affected_cpe_uri,json=affectedCpeUri,proto3" json:"affected_cpe_uri,omitempty"`
// Required. The package this vulnerability affects.
AffectedPackage string `protobuf:"bytes,5,opt,name=affected_package,json=affectedPackage,proto3" json:"affected_package,omitempty"`
// The version number at the start of an interval in which this
// vulnerability exists. A vulnerability can affect a package between
// version numbers that are disjoint sets of intervals (example:
// [1.0.0-1.1.0], [2.4.6-2.4.8] and [4.5.6-4.6.8]) each of which will be
// represented in its own Detail. If a specific affected version is provided
// by a vulnerability database, affected_version_start and
// affected_version_end will be the same in that Detail.
AffectedVersionStart *Version `protobuf:"bytes,6,opt,name=affected_version_start,json=affectedVersionStart,proto3" json:"affected_version_start,omitempty"`
// The version number at the end of an interval in which this vulnerability
// exists. A vulnerability can affect a package between version numbers
// that are disjoint sets of intervals (example: [1.0.0-1.1.0],
// [2.4.6-2.4.8] and [4.5.6-4.6.8]) each of which will be represented in its
// own Detail. If a specific affected version is provided by a vulnerability
// database, affected_version_start and affected_version_end will be the
// same in that Detail.
AffectedVersionEnd *Version `protobuf:"bytes,7,opt,name=affected_version_end,json=affectedVersionEnd,proto3" json:"affected_version_end,omitempty"`
// The distro recommended [CPE URI](https://cpe.mitre.org/specification/)
// to update to that contains a fix for this vulnerability. It is possible
// for this to be different from the affected_cpe_uri.
FixedCpeUri string `protobuf:"bytes,8,opt,name=fixed_cpe_uri,json=fixedCpeUri,proto3" json:"fixed_cpe_uri,omitempty"`
// The distro recommended package to update to that contains a fix for this
// vulnerability. It is possible for this to be different from the
// affected_package.
FixedPackage string `protobuf:"bytes,9,opt,name=fixed_package,json=fixedPackage,proto3" json:"fixed_package,omitempty"`
// The distro recommended version to update to that contains a
// fix for this vulnerability. Setting this to VersionKind.MAXIMUM means no
// such version is yet available.
FixedVersion *Version `protobuf:"bytes,10,opt,name=fixed_version,json=fixedVersion,proto3" json:"fixed_version,omitempty"`
// Whether this detail is obsolete. Occurrences are expected not to point to
// obsolete details.
IsObsolete bool `protobuf:"varint,11,opt,name=is_obsolete,json=isObsolete,proto3" json:"is_obsolete,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityNote_Detail) Reset() { *m = VulnerabilityNote_Detail{} }
func (m *VulnerabilityNote_Detail) String() string { return proto.CompactTextString(m) }
func (*VulnerabilityNote_Detail) ProtoMessage() {}
func (*VulnerabilityNote_Detail) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{0, 0}
}
func (m *VulnerabilityNote_Detail) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityNote_Detail.Unmarshal(m, b)
}
func (m *VulnerabilityNote_Detail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityNote_Detail.Marshal(b, m, deterministic)
}
func (m *VulnerabilityNote_Detail) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityNote_Detail.Merge(m, src)
}
func (m *VulnerabilityNote_Detail) XXX_Size() int {
return xxx_messageInfo_VulnerabilityNote_Detail.Size(m)
}
func (m *VulnerabilityNote_Detail) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityNote_Detail.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityNote_Detail proto.InternalMessageInfo
func (m *VulnerabilityNote_Detail) GetSeverityName() string {
if m != nil {
return m.SeverityName
}
return ""
}
func (m *VulnerabilityNote_Detail) GetDescription() string {
if m != nil {
return m.Description
}
return ""
}
func (m *VulnerabilityNote_Detail) GetPackageType() string {
if m != nil {
return m.PackageType
}
return ""
}
func (m *VulnerabilityNote_Detail) GetAffectedCpeUri() string {
if m != nil {
return m.AffectedCpeUri
}
return ""
}
func (m *VulnerabilityNote_Detail) GetAffectedPackage() string {
if m != nil {
return m.AffectedPackage
}
return ""
}
func (m *VulnerabilityNote_Detail) GetAffectedVersionStart() *Version {
if m != nil {
return m.AffectedVersionStart
}
return nil
}
func (m *VulnerabilityNote_Detail) GetAffectedVersionEnd() *Version {
if m != nil {
return m.AffectedVersionEnd
}
return nil
}
func (m *VulnerabilityNote_Detail) GetFixedCpeUri() string {
if m != nil {
return m.FixedCpeUri
}
return ""
}
func (m *VulnerabilityNote_Detail) GetFixedPackage() string {
if m != nil {
return m.FixedPackage
}
return ""
}
func (m *VulnerabilityNote_Detail) GetFixedVersion() *Version {
if m != nil {
return m.FixedVersion
}
return nil
}
func (m *VulnerabilityNote_Detail) GetIsObsolete() bool {
if m != nil {
return m.IsObsolete
}
return false
}
type VulnerabilityNote_WindowsDetail struct {
// Required. The [CPE URI](https://cpe.mitre.org/specification/) this
// vulnerability affects.
CpeUri string `protobuf:"bytes,1,opt,name=cpe_uri,json=cpeUri,proto3" json:"cpe_uri,omitempty"`
// Required. The name of this vulnerability.
Name string `protobuf:"bytes,2,opt,name=name,proto3" json:"name,omitempty"`
// The description of this vulnerability.
Description string `protobuf:"bytes,3,opt,name=description,proto3" json:"description,omitempty"`
// Required. The names of the KBs which have hotfixes to mitigate this
// vulnerability. Note that there may be multiple hotfixes (and thus
// multiple KBs) that mitigate a given vulnerability. Currently any listed
// KBs presence is considered a fix.
FixingKbs []*VulnerabilityNote_WindowsDetail_KnowledgeBase `protobuf:"bytes,4,rep,name=fixing_kbs,json=fixingKbs,proto3" json:"fixing_kbs,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityNote_WindowsDetail) Reset() { *m = VulnerabilityNote_WindowsDetail{} }
func (m *VulnerabilityNote_WindowsDetail) String() string { return proto.CompactTextString(m) }
func (*VulnerabilityNote_WindowsDetail) ProtoMessage() {}
func (*VulnerabilityNote_WindowsDetail) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{0, 1}
}
func (m *VulnerabilityNote_WindowsDetail) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail.Unmarshal(m, b)
}
func (m *VulnerabilityNote_WindowsDetail) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail.Marshal(b, m, deterministic)
}
func (m *VulnerabilityNote_WindowsDetail) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityNote_WindowsDetail.Merge(m, src)
}
func (m *VulnerabilityNote_WindowsDetail) XXX_Size() int {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail.Size(m)
}
func (m *VulnerabilityNote_WindowsDetail) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityNote_WindowsDetail.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityNote_WindowsDetail proto.InternalMessageInfo
func (m *VulnerabilityNote_WindowsDetail) GetCpeUri() string {
if m != nil {
return m.CpeUri
}
return ""
}
func (m *VulnerabilityNote_WindowsDetail) GetName() string {
if m != nil {
return m.Name
}
return ""
}
func (m *VulnerabilityNote_WindowsDetail) GetDescription() string {
if m != nil {
return m.Description
}
return ""
}
func (m *VulnerabilityNote_WindowsDetail) GetFixingKbs() []*VulnerabilityNote_WindowsDetail_KnowledgeBase {
if m != nil {
return m.FixingKbs
}
return nil
}
type VulnerabilityNote_WindowsDetail_KnowledgeBase struct {
// The KB name (generally of the form KB[0-9]+ (e.g., KB123456)).
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
// A link to the KB in the [Windows update catalog]
// (https://www.catalog.update.microsoft.com/).
Url string `protobuf:"bytes,2,opt,name=url,proto3" json:"url,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) Reset() {
*m = VulnerabilityNote_WindowsDetail_KnowledgeBase{}
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) String() string {
return proto.CompactTextString(m)
}
func (*VulnerabilityNote_WindowsDetail_KnowledgeBase) ProtoMessage() {}
func (*VulnerabilityNote_WindowsDetail_KnowledgeBase) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{0, 1, 0}
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase.Unmarshal(m, b)
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase.Marshal(b, m, deterministic)
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase.Merge(m, src)
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) XXX_Size() int {
return xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase.Size(m)
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityNote_WindowsDetail_KnowledgeBase proto.InternalMessageInfo
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) GetName() string {
if m != nil {
return m.Name
}
return ""
}
func (m *VulnerabilityNote_WindowsDetail_KnowledgeBase) GetUrl() string {
if m != nil {
return m.Url
}
return ""
}
// An occurrence of a severity vulnerability on a resource.
type VulnerabilityOccurrence struct {
// The type of package; whether native or non native (e.g., ruby gems, node.js
// packages, etc.).
Type string `protobuf:"bytes,1,opt,name=type,proto3" json:"type,omitempty"`
// Output only. The note provider assigned severity of this vulnerability.
Severity Severity `protobuf:"varint,2,opt,name=severity,proto3,enum=grafeas.v1.Severity" json:"severity,omitempty"`
// Output only. The CVSS score of this vulnerability. CVSS score is on a
// scale of 0 - 10 where 0 indicates low severity and 10 indicates high
// severity.
CvssScore float32 `protobuf:"fixed32,3,opt,name=cvss_score,json=cvssScore,proto3" json:"cvss_score,omitempty"`
// Required. The set of affected locations and their fixes (if available)
// within the associated resource.
PackageIssue []*VulnerabilityOccurrence_PackageIssue `protobuf:"bytes,4,rep,name=package_issue,json=packageIssue,proto3" json:"package_issue,omitempty"`
// Output only. A one sentence description of this vulnerability.
ShortDescription string `protobuf:"bytes,5,opt,name=short_description,json=shortDescription,proto3" json:"short_description,omitempty"`
// Output only. A detailed description of this vulnerability.
LongDescription string `protobuf:"bytes,6,opt,name=long_description,json=longDescription,proto3" json:"long_description,omitempty"`
// Output only. URLs related to this vulnerability.
RelatedUrls []*RelatedUrl `protobuf:"bytes,7,rep,name=related_urls,json=relatedUrls,proto3" json:"related_urls,omitempty"`
// The distro assigned severity for this vulnerability when it is available,
// and note provider assigned severity when distro has not yet assigned a
// severity for this vulnerability.
EffectiveSeverity Severity `protobuf:"varint,8,opt,name=effective_severity,json=effectiveSeverity,proto3,enum=grafeas.v1.Severity" json:"effective_severity,omitempty"`
// Output only. Whether at least one of the affected packages has a fix
// available.
FixAvailable bool `protobuf:"varint,9,opt,name=fix_available,json=fixAvailable,proto3" json:"fix_available,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityOccurrence) Reset() { *m = VulnerabilityOccurrence{} }
func (m *VulnerabilityOccurrence) String() string { return proto.CompactTextString(m) }
func (*VulnerabilityOccurrence) ProtoMessage() {}
func (*VulnerabilityOccurrence) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{1}
}
func (m *VulnerabilityOccurrence) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityOccurrence.Unmarshal(m, b)
}
func (m *VulnerabilityOccurrence) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityOccurrence.Marshal(b, m, deterministic)
}
func (m *VulnerabilityOccurrence) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityOccurrence.Merge(m, src)
}
func (m *VulnerabilityOccurrence) XXX_Size() int {
return xxx_messageInfo_VulnerabilityOccurrence.Size(m)
}
func (m *VulnerabilityOccurrence) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityOccurrence.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityOccurrence proto.InternalMessageInfo
func (m *VulnerabilityOccurrence) GetType() string {
if m != nil {
return m.Type
}
return ""
}
func (m *VulnerabilityOccurrence) GetSeverity() Severity {
if m != nil {
return m.Severity
}
return Severity_SEVERITY_UNSPECIFIED
}
func (m *VulnerabilityOccurrence) GetCvssScore() float32 {
if m != nil {
return m.CvssScore
}
return 0
}
func (m *VulnerabilityOccurrence) GetPackageIssue() []*VulnerabilityOccurrence_PackageIssue {
if m != nil {
return m.PackageIssue
}
return nil
}
func (m *VulnerabilityOccurrence) GetShortDescription() string {
if m != nil {
return m.ShortDescription
}
return ""
}
func (m *VulnerabilityOccurrence) GetLongDescription() string {
if m != nil {
return m.LongDescription
}
return ""
}
func (m *VulnerabilityOccurrence) GetRelatedUrls() []*RelatedUrl {
if m != nil {
return m.RelatedUrls
}
return nil
}
func (m *VulnerabilityOccurrence) GetEffectiveSeverity() Severity {
if m != nil {
return m.EffectiveSeverity
}
return Severity_SEVERITY_UNSPECIFIED
}
func (m *VulnerabilityOccurrence) GetFixAvailable() bool {
if m != nil {
return m.FixAvailable
}
return false
}
// A detail for a distro and package this vulnerability occurrence was found
// in and its associated fix (if one is available).
type VulnerabilityOccurrence_PackageIssue struct {
// Required. The [CPE URI](https://cpe.mitre.org/specification/) this
// vulnerability was found in.
AffectedCpeUri string `protobuf:"bytes,1,opt,name=affected_cpe_uri,json=affectedCpeUri,proto3" json:"affected_cpe_uri,omitempty"`
// Required. The package this vulnerability was found in.
AffectedPackage string `protobuf:"bytes,2,opt,name=affected_package,json=affectedPackage,proto3" json:"affected_package,omitempty"`
// Required. The version of the package that is installed on the resource
// affected by this vulnerability.
AffectedVersion *Version `protobuf:"bytes,3,opt,name=affected_version,json=affectedVersion,proto3" json:"affected_version,omitempty"`
// The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability
// was fixed in. It is possible for this to be different from the
// affected_cpe_uri.
FixedCpeUri string `protobuf:"bytes,4,opt,name=fixed_cpe_uri,json=fixedCpeUri,proto3" json:"fixed_cpe_uri,omitempty"`
// The package this vulnerability was fixed in. It is possible for this to
// be different from the affected_package.
FixedPackage string `protobuf:"bytes,5,opt,name=fixed_package,json=fixedPackage,proto3" json:"fixed_package,omitempty"`
// Required. The version of the package this vulnerability was fixed in.
// Setting this to VersionKind.MAXIMUM means no fix is yet available.
FixedVersion *Version `protobuf:"bytes,6,opt,name=fixed_version,json=fixedVersion,proto3" json:"fixed_version,omitempty"`
// Output only. Whether a fix is available for this package.
FixAvailable bool `protobuf:"varint,7,opt,name=fix_available,json=fixAvailable,proto3" json:"fix_available,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *VulnerabilityOccurrence_PackageIssue) Reset() { *m = VulnerabilityOccurrence_PackageIssue{} }
func (m *VulnerabilityOccurrence_PackageIssue) String() string { return proto.CompactTextString(m) }
func (*VulnerabilityOccurrence_PackageIssue) ProtoMessage() {}
func (*VulnerabilityOccurrence_PackageIssue) Descriptor() ([]byte, []int) {
return fileDescriptor_cc4b69df8d04ae33, []int{1, 0}
}
func (m *VulnerabilityOccurrence_PackageIssue) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_VulnerabilityOccurrence_PackageIssue.Unmarshal(m, b)
}
func (m *VulnerabilityOccurrence_PackageIssue) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_VulnerabilityOccurrence_PackageIssue.Marshal(b, m, deterministic)
}
func (m *VulnerabilityOccurrence_PackageIssue) XXX_Merge(src proto.Message) {
xxx_messageInfo_VulnerabilityOccurrence_PackageIssue.Merge(m, src)
}
func (m *VulnerabilityOccurrence_PackageIssue) XXX_Size() int {
return xxx_messageInfo_VulnerabilityOccurrence_PackageIssue.Size(m)
}
func (m *VulnerabilityOccurrence_PackageIssue) XXX_DiscardUnknown() {
xxx_messageInfo_VulnerabilityOccurrence_PackageIssue.DiscardUnknown(m)
}
var xxx_messageInfo_VulnerabilityOccurrence_PackageIssue proto.InternalMessageInfo
func (m *VulnerabilityOccurrence_PackageIssue) GetAffectedCpeUri() string {
if m != nil {
return m.AffectedCpeUri
}
return ""
}
func (m *VulnerabilityOccurrence_PackageIssue) GetAffectedPackage() string {
if m != nil {
return m.AffectedPackage
}
return ""
}
func (m *VulnerabilityOccurrence_PackageIssue) GetAffectedVersion() *Version {
if m != nil {
return m.AffectedVersion
}
return nil
}
func (m *VulnerabilityOccurrence_PackageIssue) GetFixedCpeUri() string {
if m != nil {
return m.FixedCpeUri
}
return ""
}
func (m *VulnerabilityOccurrence_PackageIssue) GetFixedPackage() string {
if m != nil {
return m.FixedPackage
}
return ""
}
func (m *VulnerabilityOccurrence_PackageIssue) GetFixedVersion() *Version {
if m != nil {
return m.FixedVersion
}
return nil
}
func (m *VulnerabilityOccurrence_PackageIssue) GetFixAvailable() bool {
if m != nil {
return m.FixAvailable
}
return false
}
func init() {
proto.RegisterEnum("grafeas.v1.Severity", Severity_name, Severity_value)
proto.RegisterType((*VulnerabilityNote)(nil), "grafeas.v1.VulnerabilityNote")
proto.RegisterType((*VulnerabilityNote_Detail)(nil), "grafeas.v1.VulnerabilityNote.Detail")
proto.RegisterType((*VulnerabilityNote_WindowsDetail)(nil), "grafeas.v1.VulnerabilityNote.WindowsDetail")
proto.RegisterType((*VulnerabilityNote_WindowsDetail_KnowledgeBase)(nil), "grafeas.v1.VulnerabilityNote.WindowsDetail.KnowledgeBase")
proto.RegisterType((*VulnerabilityOccurrence)(nil), "grafeas.v1.VulnerabilityOccurrence")
proto.RegisterType((*VulnerabilityOccurrence_PackageIssue)(nil), "grafeas.v1.VulnerabilityOccurrence.PackageIssue")
}
func init() { proto.RegisterFile("grafeas/v1/vulnerability.proto", fileDescriptor_cc4b69df8d04ae33) }
var fileDescriptor_cc4b69df8d04ae33 = []byte{
// 897 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x9c, 0x55, 0xdd, 0x6e, 0xdb, 0x36,
0x14, 0x9e, 0x2c, 0xc7, 0x3f, 0xc7, 0x76, 0xa2, 0x70, 0x59, 0x23, 0x18, 0xd8, 0xe6, 0xa5, 0xbb,
0x70, 0x17, 0x40, 0x6e, 0x13, 0x0c, 0x68, 0x31, 0xa0, 0x40, 0xea, 0x78, 0xad, 0xd0, 0xfc, 0x4d,
0x8e, 0xd3, 0x6d, 0x17, 0x13, 0x64, 0x99, 0xd6, 0x88, 0x2a, 0xa2, 0x41, 0xca, 0x4a, 0xf3, 0x28,
0xbb, 0x1b, 0xf6, 0x3a, 0x7b, 0x98, 0x3d, 0xc1, 0x80, 0x41, 0x24, 0xe5, 0xd0, 0x71, 0x13, 0x64,
0xbd, 0xa3, 0xbe, 0xf3, 0x1d, 0xf2, 0xe3, 0xc7, 0x73, 0x8e, 0xe0, 0xab, 0x88, 0x05, 0x53, 0x1c,
0xf0, 0x5e, 0xf6, 0xac, 0x97, 0xcd, 0xe3, 0x04, 0xb3, 0x60, 0x4c, 0x62, 0x92, 0x5e, 0x3b, 0x33,
0x46, 0x53, 0x8a, 0x40, 0xc5, 0x9d, 0xec, 0x59, 0x7b, 0x5b, 0xe3, 0x86, 0xf4, 0xf2, 0x92, 0x26,
0x92, 0xd4, 0xfe, 0x42, 0x0f, 0x64, 0x9c, 0x2b, 0xd8, 0xd6, 0xe0, 0x59, 0x10, 0xbe, 0x0f, 0x22,
0x2c, 0x23, 0x3b, 0x7f, 0xd4, 0x60, 0xf3, 0x42, 0x3f, 0xed, 0x84, 0xa6, 0x18, 0x7d, 0x09, 0x90,
0x67, 0xfb, 0x3c, 0xa4, 0x0c, 0xdb, 0x46, 0xc7, 0xe8, 0x96, 0xbc, 0x7a, 0x8e, 0x0c, 0x73, 0x00,
0x3d, 0x85, 0x1a, 0xc7, 0x19, 0x66, 0x24, 0xbd, 0xb6, 0x4b, 0x1d, 0xa3, 0xbb, 0xbe, 0xb7, 0xe5,
0xdc, 0xa8, 0x73, 0x86, 0x2a, 0xe6, 0x2d, 0x58, 0xe8, 0x25, 0x54, 0x27, 0x38, 0x0d, 0x48, 0xcc,
0x6d, 0xb3, 0x63, 0x76, 0x1b, 0x7b, 0xdf, 0xea, 0x09, 0x2b, 0x02, 0x9c, 0x43, 0x41, 0xf6, 0x8a,
0x24, 0xb4, 0x0b, 0x55, 0x21, 0x28, 0xdb, 0xb7, 0xcb, 0x1d, 0xa3, 0xdb, 0xd8, 0x43, 0x7a, 0x7e,
0xff, 0x62, 0x38, 0xcc, 0xf6, 0xbd, 0x4a, 0x4e, 0xb9, 0xd8, 0x47, 0xe7, 0xb0, 0x71, 0x45, 0x92,
0x09, 0xbd, 0xe2, 0x7e, 0x71, 0xe8, 0x9a, 0x38, 0x74, 0xf7, 0xfe, 0x43, 0xdf, 0xc9, 0x24, 0x75,
0xf6, 0xfa, 0x95, 0xfe, 0xc9, 0xdb, 0xff, 0x9a, 0x50, 0x91, 0x6b, 0xf4, 0x18, 0x5a, 0xc5, 0xcd,
0xfc, 0x24, 0xb8, 0x94, 0x0e, 0xd5, 0xbd, 0x66, 0x01, 0x9e, 0x04, 0x97, 0x18, 0x75, 0xa0, 0x31,
0xc1, 0x3c, 0x64, 0x64, 0x96, 0x12, 0x9a, 0x08, 0x9f, 0xea, 0x9e, 0x0e, 0xa1, 0x6f, 0xa0, 0xa9,
0x1e, 0xc3, 0x4f, 0xaf, 0x67, 0xd8, 0x36, 0x25, 0x45, 0x61, 0xe7, 0xd7, 0x33, 0x8c, 0xba, 0x60,
0x05, 0xd3, 0x29, 0x0e, 0x53, 0x3c, 0xf1, 0xc3, 0x19, 0xf6, 0xe7, 0x8c, 0x08, 0x03, 0xea, 0xde,
0x7a, 0x81, 0xf7, 0x67, 0x78, 0xc4, 0x08, 0x7a, 0xa2, 0x31, 0xd5, 0x0e, 0xf6, 0x9a, 0x60, 0x6e,
0x14, 0xf8, 0x99, 0x84, 0x91, 0x0b, 0x8f, 0x16, 0xd4, 0x0c, 0x33, 0x4e, 0x68, 0xe2, 0xf3, 0x34,
0x60, 0xa9, 0x5d, 0x11, 0xde, 0x7e, 0xbe, 0x64, 0x93, 0x24, 0x78, 0x5b, 0x45, 0x8a, 0x02, 0x86,
0x79, 0x02, 0x1a, 0xc0, 0xd6, 0xca, 0x56, 0x38, 0x99, 0xd8, 0xd5, 0xbb, 0x37, 0x42, 0xb7, 0x36,
0x1a, 0x24, 0x13, 0xb4, 0x03, 0xad, 0x29, 0xf9, 0xa0, 0xdd, 0xb1, 0x26, 0xad, 0x10, 0xa0, 0xba,
0xe0, 0xe3, 0x82, 0x53, 0xdc, 0xae, 0x2e, 0x4d, 0x17, 0x60, 0x71, 0xb5, 0xe7, 0x05, 0x49, 0x89,
0xb1, 0xe1, 0x6e, 0x21, 0x32, 0x53, 0x7d, 0xa1, 0xaf, 0xa1, 0x41, 0xb8, 0x4f, 0xc7, 0x9c, 0xc6,
0x38, 0xc5, 0x76, 0xa3, 0x63, 0x74, 0x6b, 0x1e, 0x10, 0x7e, 0xaa, 0x90, 0xf6, 0x3f, 0x06, 0xb4,
0x96, 0x2a, 0x04, 0x6d, 0x43, 0xb5, 0xd0, 0x2b, 0x0b, 0xa0, 0x12, 0x4a, 0xa9, 0x08, 0xca, 0xa2,
0x2c, 0xe4, 0x9b, 0x8b, 0xf5, 0xed, 0x72, 0x30, 0x57, 0xcb, 0xe1, 0x67, 0x80, 0x29, 0xf9, 0x40,
0x92, 0xc8, 0x7f, 0x3f, 0xe6, 0x76, 0x59, 0x54, 0xec, 0x8b, 0xff, 0x51, 0xb1, 0xce, 0xdb, 0x84,
0x5e, 0xc5, 0x78, 0x12, 0xe1, 0x57, 0x01, 0xc7, 0x5e, 0x5d, 0x6e, 0xf6, 0x76, 0xcc, 0xdb, 0xdf,
0x43, 0x6b, 0x29, 0xb6, 0x10, 0x68, 0x68, 0x02, 0x2d, 0x30, 0xe7, 0x2c, 0x56, 0x9a, 0xf3, 0xe5,
0xce, 0x9f, 0x15, 0xd8, 0x5e, 0x3a, 0xf3, 0x34, 0x0c, 0xe7, 0x8c, 0xe1, 0x24, 0x14, 0x3b, 0x88,
0x9a, 0x55, 0x3b, 0xe4, 0xeb, 0x4f, 0x18, 0x0b, 0xcb, 0x73, 0xc6, 0xbc, 0x3d, 0x67, 0x46, 0xd0,
0x2a, 0x1a, 0x84, 0x70, 0x3e, 0xc7, 0xca, 0x94, 0xa7, 0x77, 0x9a, 0x72, 0x23, 0xd0, 0x51, 0x15,
0xe1, 0xe6, 0x79, 0x5e, 0xd1, 0x67, 0xe2, 0x0b, 0xed, 0xc2, 0x26, 0xff, 0x9d, 0xb2, 0xd4, 0xd7,
0x1f, 0x44, 0xf6, 0x8a, 0x25, 0x02, 0x87, 0xda, 0xab, 0x3c, 0x01, 0x2b, 0xa6, 0x49, 0xb4, 0xc4,
0xad, 0xc8, 0xbe, 0xca, 0x71, 0x9d, 0xfa, 0x02, 0x9a, 0x0c, 0xc7, 0x41, 0xde, 0x0b, 0x73, 0x16,
0x73, 0xbb, 0x2a, 0xd4, 0x3e, 0xd2, 0xd5, 0x7a, 0x32, 0x3e, 0x62, 0xb1, 0xd7, 0x60, 0x8b, 0x35,
0x47, 0x7d, 0x40, 0x58, 0xb4, 0x05, 0xc9, 0xb0, 0xbf, 0x30, 0xb1, 0x76, 0x8f, 0x89, 0x9b, 0x0b,
0x7e, 0x01, 0xa9, 0x0e, 0xf1, 0x83, 0x2c, 0x20, 0x71, 0x30, 0x8e, 0x65, 0x87, 0xd4, 0x44, 0x9d,
0x1f, 0x14, 0x58, 0xfb, 0xef, 0x12, 0x34, 0x75, 0x6f, 0x3e, 0x3a, 0x62, 0x8c, 0x07, 0x8f, 0x98,
0xd2, 0xc7, 0x47, 0xcc, 0x4b, 0x8d, 0x5a, 0xb4, 0xa2, 0x79, 0x77, 0x2b, 0x6e, 0xdc, 0x9a, 0x09,
0xab, 0x03, 0xa1, 0xfc, 0x80, 0x81, 0xb0, 0xf6, 0x90, 0x81, 0x50, 0x79, 0xe8, 0x40, 0x58, 0x71,
0xb3, 0xba, 0xea, 0xe6, 0x77, 0xbf, 0x41, 0x6d, 0x61, 0xbf, 0x0d, 0x5b, 0xc3, 0xc1, 0xc5, 0xc0,
0x73, 0xcf, 0x7f, 0xf1, 0x47, 0x27, 0xc3, 0xb3, 0x41, 0xdf, 0xfd, 0xd1, 0x1d, 0x1c, 0x5a, 0x9f,
0xa1, 0x06, 0x54, 0x8f, 0xdd, 0x13, 0xf7, 0xf8, 0xe0, 0xc8, 0x32, 0x50, 0x15, 0xcc, 0xa3, 0xd3,
0x77, 0x56, 0x09, 0x01, 0x54, 0x8e, 0x07, 0x87, 0xee, 0xe8, 0xd8, 0x32, 0x51, 0x0d, 0xca, 0x6f,
0xdc, 0xd7, 0x6f, 0xac, 0x32, 0x6a, 0x42, 0xad, 0xef, 0xb9, 0xe7, 0x6e, 0xff, 0xe0, 0xc8, 0x5a,
0x7b, 0xf5, 0x13, 0xb4, 0x08, 0xd5, 0xb4, 0x9e, 0x19, 0xbf, 0x3e, 0x8f, 0x28, 0x8d, 0x62, 0xec,
0x44, 0x34, 0x0e, 0x92, 0xc8, 0xa1, 0x2c, 0xea, 0x45, 0x38, 0x11, 0x7f, 0xf3, 0x9e, 0x0c, 0x05,
0x33, 0xc2, 0x7b, 0x37, 0x7f, 0xfc, 0x1f, 0xd4, 0xf2, 0xaf, 0x92, 0xf9, 0xda, 0x3b, 0x18, 0x57,
0x04, 0x75, 0xff, 0xbf, 0x00, 0x00, 0x00, 0xff, 0xff, 0xc3, 0x5d, 0x01, 0x75, 0x70, 0x08, 0x00,
0x00,
}