/*
 * Copyright 2019 The Grafeas Authors. All rights reserved.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: grafeas/v1/vulnerability.proto

package io.grafeas.v1;

public interface VulnerabilityNoteOrBuilder
    extends
    // @@protoc_insertion_point(interface_extends:grafeas.v1.VulnerabilityNote)
    com.google.protobuf.MessageOrBuilder {

  /**
   *
   *
   * <pre>
   * The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10
   * where 0 indicates low severity and 10 indicates high severity.
   * </pre>
   *
   * <code>float cvss_score = 1;</code>
   *
   * @return The cvssScore.
   */
  float getCvssScore();

  /**
   *
   *
   * <pre>
   * The note provider assigned severity of this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.Severity severity = 2;</code>
   *
   * @return The enum numeric value on the wire for severity.
   */
  int getSeverityValue();
  /**
   *
   *
   * <pre>
   * The note provider assigned severity of this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.Severity severity = 2;</code>
   *
   * @return The severity.
   */
  io.grafeas.v1.Severity getSeverity();

  /**
   *
   *
   * <pre>
   * Details of all known distros and packages affected by this vulnerability.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;</code>
   */
  java.util.List<io.grafeas.v1.VulnerabilityNote.Detail> getDetailsList();
  /**
   *
   *
   * <pre>
   * Details of all known distros and packages affected by this vulnerability.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;</code>
   */
  io.grafeas.v1.VulnerabilityNote.Detail getDetails(int index);
  /**
   *
   *
   * <pre>
   * Details of all known distros and packages affected by this vulnerability.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;</code>
   */
  int getDetailsCount();
  /**
   *
   *
   * <pre>
   * Details of all known distros and packages affected by this vulnerability.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;</code>
   */
  java.util.List<? extends io.grafeas.v1.VulnerabilityNote.DetailOrBuilder>
      getDetailsOrBuilderList();
  /**
   *
   *
   * <pre>
   * Details of all known distros and packages affected by this vulnerability.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.Detail details = 3;</code>
   */
  io.grafeas.v1.VulnerabilityNote.DetailOrBuilder getDetailsOrBuilder(int index);

  /**
   *
   *
   * <pre>
   * The full description of the CVSSv3 for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSSv3 cvss_v3 = 4;</code>
   *
   * @return Whether the cvssV3 field is set.
   */
  boolean hasCvssV3();
  /**
   *
   *
   * <pre>
   * The full description of the CVSSv3 for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSSv3 cvss_v3 = 4;</code>
   *
   * @return The cvssV3.
   */
  io.grafeas.v1.CVSSv3 getCvssV3();
  /**
   *
   *
   * <pre>
   * The full description of the CVSSv3 for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSSv3 cvss_v3 = 4;</code>
   */
  io.grafeas.v1.CVSSv3OrBuilder getCvssV3OrBuilder();

  /**
   *
   *
   * <pre>
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;</code>
   */
  java.util.List<io.grafeas.v1.VulnerabilityNote.WindowsDetail> getWindowsDetailsList();
  /**
   *
   *
   * <pre>
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;</code>
   */
  io.grafeas.v1.VulnerabilityNote.WindowsDetail getWindowsDetails(int index);
  /**
   *
   *
   * <pre>
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;</code>
   */
  int getWindowsDetailsCount();
  /**
   *
   *
   * <pre>
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;</code>
   */
  java.util.List<? extends io.grafeas.v1.VulnerabilityNote.WindowsDetailOrBuilder>
      getWindowsDetailsOrBuilderList();
  /**
   *
   *
   * <pre>
   * Windows details get their own format because the information format and
   * model don't match a normal detail. Specifically Windows updates are done as
   * patches, thus Windows vulnerabilities really are a missing package, rather
   * than a package being at an incorrect version.
   * </pre>
   *
   * <code>repeated .grafeas.v1.VulnerabilityNote.WindowsDetail windows_details = 5;</code>
   */
  io.grafeas.v1.VulnerabilityNote.WindowsDetailOrBuilder getWindowsDetailsOrBuilder(int index);

  /**
   *
   *
   * <pre>
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * </pre>
   *
   * <code>.google.protobuf.Timestamp source_update_time = 6;</code>
   *
   * @return Whether the sourceUpdateTime field is set.
   */
  boolean hasSourceUpdateTime();
  /**
   *
   *
   * <pre>
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * </pre>
   *
   * <code>.google.protobuf.Timestamp source_update_time = 6;</code>
   *
   * @return The sourceUpdateTime.
   */
  com.google.protobuf.Timestamp getSourceUpdateTime();
  /**
   *
   *
   * <pre>
   * The time this information was last changed at the source. This is an
   * upstream timestamp from the underlying information source - e.g. Ubuntu
   * security tracker.
   * </pre>
   *
   * <code>.google.protobuf.Timestamp source_update_time = 6;</code>
   */
  com.google.protobuf.TimestampOrBuilder getSourceUpdateTimeOrBuilder();

  /**
   *
   *
   * <pre>
   * CVSS version used to populate cvss_score and severity.
   * </pre>
   *
   * <code>.grafeas.v1.CVSSVersion cvss_version = 7;</code>
   *
   * @return The enum numeric value on the wire for cvssVersion.
   */
  int getCvssVersionValue();
  /**
   *
   *
   * <pre>
   * CVSS version used to populate cvss_score and severity.
   * </pre>
   *
   * <code>.grafeas.v1.CVSSVersion cvss_version = 7;</code>
   *
   * @return The cvssVersion.
   */
  io.grafeas.v1.CVSSVersion getCvssVersion();

  /**
   *
   *
   * <pre>
   * The full description of the v2 CVSS for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSS cvss_v2 = 8;</code>
   *
   * @return Whether the cvssV2 field is set.
   */
  boolean hasCvssV2();
  /**
   *
   *
   * <pre>
   * The full description of the v2 CVSS for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSS cvss_v2 = 8;</code>
   *
   * @return The cvssV2.
   */
  io.grafeas.v1.CVSS getCvssV2();
  /**
   *
   *
   * <pre>
   * The full description of the v2 CVSS for this vulnerability.
   * </pre>
   *
   * <code>.grafeas.v1.CVSS cvss_v2 = 8;</code>
   */
  io.grafeas.v1.CVSSOrBuilder getCvssV2OrBuilder();
}
