Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
nested_types=[],
enum_types=[],
serialized_options=None,
is_extendable=False,
syntax="proto3",
extension_ranges=[],
oneofs=[],
serialized_start=185,
serialized_end=279,
)
_ATTESTATIONNOTE_HINT.containing_type = _ATTESTATIONNOTE
_ATTESTATIONNOTE.fields_by_name["hint"].message_type = _ATTESTATIONNOTE_HINT
_ATTESTATIONOCCURRENCE.fields_by_name[
"signatures"
].message_type = grafeas__v1_dot_proto_dot_common__pb2._SIGNATURE
DESCRIPTOR.message_types_by_name["AttestationNote"] = _ATTESTATIONNOTE
DESCRIPTOR.message_types_by_name["AttestationOccurrence"] = _ATTESTATIONOCCURRENCE
_sym_db.RegisterFileDescriptor(DESCRIPTOR)
AttestationNote = _reflection.GeneratedProtocolMessageType(
"AttestationNote",
(_message.Message,),
dict(
Hint=_reflection.GeneratedProtocolMessageType(
"Hint",
(_message.Message,),
dict(
DESCRIPTOR=_ATTESTATIONNOTE_HINT,
__module__="grafeas_v1.proto.attestation_pb2",
__doc__="""This submessage provides human-readable hints about the purpose of the
authority. Because the name of a note acts as its resource reference, it
from grafeas.grafeas_v1.proto import provenance_pb2
from grafeas.grafeas_v1.proto import vulnerability_pb2
_shared_modules = [
any_pb2,
empty_pb2,
field_mask_pb2,
timestamp_pb2,
status_pb2,
]
_local_modules = [
attestation_pb2,
build_pb2,
common_pb2,
cvss_pb2,
deployment_pb2,
discovery_pb2,
grafeas_pb2,
image_pb2,
package_pb2,
provenance_pb2,
vulnerability_pb2,
]
names = []
for module in _shared_modules: # pragma: NO COVER
for name, message in get_messages(module).items():
setattr(sys.modules[__name__], name, message)
names.append(name)
"windows_details"
].message_type = _VULNERABILITYNOTE_WINDOWSDETAIL
_VULNERABILITYOCCURRENCE_PACKAGEISSUE.fields_by_name[
"affected_version"
].message_type = grafeas__v1_dot_proto_dot_package__pb2._VERSION
_VULNERABILITYOCCURRENCE_PACKAGEISSUE.fields_by_name[
"fixed_version"
].message_type = grafeas__v1_dot_proto_dot_package__pb2._VERSION
_VULNERABILITYOCCURRENCE_PACKAGEISSUE.containing_type = _VULNERABILITYOCCURRENCE
_VULNERABILITYOCCURRENCE.fields_by_name["severity"].enum_type = _SEVERITY
_VULNERABILITYOCCURRENCE.fields_by_name[
"package_issue"
].message_type = _VULNERABILITYOCCURRENCE_PACKAGEISSUE
_VULNERABILITYOCCURRENCE.fields_by_name[
"related_urls"
].message_type = grafeas__v1_dot_proto_dot_common__pb2._RELATEDURL
_VULNERABILITYOCCURRENCE.fields_by_name["effective_severity"].enum_type = _SEVERITY
DESCRIPTOR.message_types_by_name["VulnerabilityNote"] = _VULNERABILITYNOTE
DESCRIPTOR.message_types_by_name["VulnerabilityOccurrence"] = _VULNERABILITYOCCURRENCE
DESCRIPTOR.enum_types_by_name["Severity"] = _SEVERITY
_sym_db.RegisterFileDescriptor(DESCRIPTOR)
VulnerabilityNote = _reflection.GeneratedProtocolMessageType(
"VulnerabilityNote",
(_message.Message,),
dict(
Detail=_reflection.GeneratedProtocolMessageType(
"Detail",
(_message.Message,),
dict(
DESCRIPTOR=_VULNERABILITYNOTE_DETAIL,
__module__="grafeas_v1.proto.vulnerability_pb2",