# frozen_string_literal: true # Generated by the protocol buffer compiler. DO NOT EDIT! # source: grafeas/v1/vulnerability.proto require 'google/protobuf' require 'google/api/field_behavior_pb' require 'google/protobuf/timestamp_pb' require 'grafeas/v1/common_pb' require 'grafeas/v1/cvss_pb' require 'grafeas/v1/package_pb' require 'grafeas/v1/severity_pb' require 'grafeas/v1/vex_pb' descriptor_data = "\n\x1egrafeas/v1/vulnerability.proto\x12\ngrafeas.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17grafeas/v1/common.proto\x1a\x15grafeas/v1/cvss.proto\x1a\x18grafeas/v1/package.proto\x1a\x19grafeas/v1/severity.proto\x1a\x14grafeas/v1/vex.proto\"\xec\x07\n\x11VulnerabilityNote\x12\x12\n\ncvss_score\x18\x01 \x01(\x02\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x35\n\x07\x64\x65tails\x18\x03 \x03(\x0b\x32$.grafeas.v1.VulnerabilityNote.Detail\x12#\n\x07\x63vss_v3\x18\x04 \x01(\x0b\x32\x12.grafeas.v1.CVSSv3\x12\x44\n\x0fwindows_details\x18\x05 \x03(\x0b\x32+.grafeas.v1.VulnerabilityNote.WindowsDetail\x12\x36\n\x12source_update_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12-\n\x0c\x63vss_version\x18\x07 \x01(\x0e\x32\x17.grafeas.v1.CVSSVersion\x12!\n\x07\x63vss_v2\x18\x08 \x01(\x0b\x32\x10.grafeas.v1.CVSS\x1a\xad\x03\n\x06\x44\x65tail\x12\x15\n\rseverity_name\x18\x01 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x02 \x01(\t\x12\x14\n\x0cpackage_type\x18\x03 \x01(\t\x12\x18\n\x10\x61\x66\x66\x65\x63ted_cpe_uri\x18\x04 \x01(\t\x12\x18\n\x10\x61\x66\x66\x65\x63ted_package\x18\x05 \x01(\t\x12\x33\n\x16\x61\x66\x66\x65\x63ted_version_start\x18\x06 \x01(\x0b\x32\x13.grafeas.v1.Version\x12\x31\n\x14\x61\x66\x66\x65\x63ted_version_end\x18\x07 \x01(\x0b\x32\x13.grafeas.v1.Version\x12\x15\n\rfixed_cpe_uri\x18\x08 \x01(\t\x12\x15\n\rfixed_package\x18\t \x01(\t\x12*\n\rfixed_version\x18\n \x01(\x0b\x32\x13.grafeas.v1.Version\x12\x13\n\x0bis_obsolete\x18\x0b \x01(\x08\x12\x36\n\x12source_update_time\x18\x0c \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x0e\n\x06source\x18\r \x01(\t\x12\x0e\n\x06vendor\x18\x0e \x01(\t\x1a\xbe\x01\n\rWindowsDetail\x12\x0f\n\x07\x63pe_uri\x18\x01 \x01(\t\x12\x0c\n\x04name\x18\x02 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x03 \x01(\t\x12M\n\nfixing_kbs\x18\x04 \x03(\x0b\x32\x39.grafeas.v1.VulnerabilityNote.WindowsDetail.KnowledgeBase\x1a*\n\rKnowledgeBase\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x0b\n\x03url\x18\x02 \x01(\t\"\x98\n\n\x17VulnerabilityOccurrence\x12\x0c\n\x04type\x18\x01 \x01(\t\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x12\n\ncvss_score\x18\x03 \x01(\x02\x12 \n\x06\x63vssv3\x18\n \x01(\x0b\x32\x10.grafeas.v1.CVSS\x12G\n\rpackage_issue\x18\x04 \x03(\x0b\x32\x30.grafeas.v1.VulnerabilityOccurrence.PackageIssue\x12\x19\n\x11short_description\x18\x05 \x01(\t\x12\x18\n\x10long_description\x18\x06 \x01(\t\x12,\n\x0crelated_urls\x18\x07 \x03(\x0b\x32\x16.grafeas.v1.RelatedUrl\x12\x30\n\x12\x65\x66\x66\x65\x63tive_severity\x18\x08 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x15\n\rfix_available\x18\t \x01(\x08\x12-\n\x0c\x63vss_version\x18\x0b \x01(\x0e\x32\x17.grafeas.v1.CVSSVersion\x12!\n\x07\x63vss_v2\x18\x0c \x01(\x0b\x32\x10.grafeas.v1.CVSS\x12I\n\x0evex_assessment\x18\r \x01(\x0b\x32\x31.grafeas.v1.VulnerabilityOccurrence.VexAssessment\x12\x15\n\rextra_details\x18\x0e \x01(\t\x1a\xe0\x02\n\x0cPackageIssue\x12\x18\n\x10\x61\x66\x66\x65\x63ted_cpe_uri\x18\x01 \x01(\t\x12\x18\n\x10\x61\x66\x66\x65\x63ted_package\x18\x02 \x01(\t\x12-\n\x10\x61\x66\x66\x65\x63ted_version\x18\x03 \x01(\x0b\x32\x13.grafeas.v1.Version\x12\x15\n\rfixed_cpe_uri\x18\x04 \x01(\t\x12\x15\n\rfixed_package\x18\x05 \x01(\t\x12*\n\rfixed_version\x18\x06 \x01(\x0b\x32\x13.grafeas.v1.Version\x12\x15\n\rfix_available\x18\x07 \x01(\x08\x12\x14\n\x0cpackage_type\x18\x08 \x01(\t\x12\x35\n\x12\x65\x66\x66\x65\x63tive_severity\x18\t \x01(\x0e\x32\x14.grafeas.v1.SeverityB\x03\xe0\x41\x03\x12/\n\rfile_location\x18\n \x03(\x0b\x32\x18.grafeas.v1.FileLocation\x1a\x84\x03\n\rVexAssessment\x12\x0f\n\x03\x63ve\x18\x01 \x01(\tB\x02\x18\x01\x12\x18\n\x10vulnerability_id\x18\x08 \x01(\t\x12,\n\x0crelated_uris\x18\x02 \x03(\x0b\x32\x16.grafeas.v1.RelatedUrl\x12\x11\n\tnote_name\x18\x03 \x01(\t\x12G\n\x05state\x18\x04 \x01(\x0e\x32\x38.grafeas.v1.VulnerabilityAssessmentNote.Assessment.State\x12\x0f\n\x07impacts\x18\x05 \x03(\t\x12T\n\x0cremediations\x18\x06 \x03(\x0b\x32>.grafeas.v1.VulnerabilityAssessmentNote.Assessment.Remediation\x12W\n\rjustification\x18\x07 \x01(\x0b\x32@.grafeas.v1.VulnerabilityAssessmentNote.Assessment.JustificationBQ\n\rio.grafeas.v1P\x01Z8google.golang.org/genproto/googleapis/grafeas/v1;grafeas\xa2\x02\x03GRAb\x06proto3" pool = Google::Protobuf::DescriptorPool.generated_pool begin pool.add_serialized_file(descriptor_data) rescue TypeError # Compatibility code: will be removed in the next major version. require 'google/protobuf/descriptor_pb' parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data) parsed.clear_dependency serialized = parsed.class.encode(parsed) file = pool.add_serialized_file(serialized) warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}" imports = [ ["grafeas.v1.CVSSv3", "grafeas/v1/cvss.proto"], ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"], ["grafeas.v1.Version", "grafeas/v1/package.proto"], ["grafeas.v1.RelatedUrl", "grafeas/v1/common.proto"], ["grafeas.v1.VulnerabilityAssessmentNote.Assessment.Remediation", "grafeas/v1/vex.proto"], ] imports.each do |type_name, expected_filename| import_file = pool.lookup(type_name).file_descriptor if import_file.name != expected_filename warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}" end end warn "Each proto file must use a consistent fully-qualified name." warn "This will become an error in the next major version." end module Grafeas module V1 VulnerabilityNote = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityNote").msgclass VulnerabilityNote::Detail = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityNote.Detail").msgclass VulnerabilityNote::WindowsDetail = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityNote.WindowsDetail").msgclass VulnerabilityNote::WindowsDetail::KnowledgeBase = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityNote.WindowsDetail.KnowledgeBase").msgclass VulnerabilityOccurrence = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityOccurrence").msgclass VulnerabilityOccurrence::PackageIssue = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityOccurrence.PackageIssue").msgclass VulnerabilityOccurrence::VexAssessment = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("grafeas.v1.VulnerabilityOccurrence.VexAssessment").msgclass end end