
com.google.api.services.containeranalysis.v1.model.WindowsDetail Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.containeranalysis.v1.model;
/**
* Model definition for WindowsDetail.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Container Analysis API. For a detailed explanation
* see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class WindowsDetail extends com.google.api.client.json.GenericJson {
/**
* Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String cpeUri;
/**
* The description of this vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String description;
/**
* Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that
* there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability.
* Currently any listed KBs presence is considered a fix.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.util.List fixingKbs;
static {
// hack to force ProGuard to consider KnowledgeBase used, since otherwise it would be stripped out
// see https://github.com/google/google-api-java-client/issues/543
com.google.api.client.util.Data.nullOf(KnowledgeBase.class);
}
/**
* Required. The name of this vulnerability.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String name;
/**
* Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects.
* @return value or {@code null} for none
*/
public java.lang.String getCpeUri() {
return cpeUri;
}
/**
* Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects.
* @param cpeUri cpeUri or {@code null} for none
*/
public WindowsDetail setCpeUri(java.lang.String cpeUri) {
this.cpeUri = cpeUri;
return this;
}
/**
* The description of this vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getDescription() {
return description;
}
/**
* The description of this vulnerability.
* @param description description or {@code null} for none
*/
public WindowsDetail setDescription(java.lang.String description) {
this.description = description;
return this;
}
/**
* Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that
* there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability.
* Currently any listed KBs presence is considered a fix.
* @return value or {@code null} for none
*/
public java.util.List getFixingKbs() {
return fixingKbs;
}
/**
* Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that
* there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability.
* Currently any listed KBs presence is considered a fix.
* @param fixingKbs fixingKbs or {@code null} for none
*/
public WindowsDetail setFixingKbs(java.util.List fixingKbs) {
this.fixingKbs = fixingKbs;
return this;
}
/**
* Required. The name of this vulnerability.
* @return value or {@code null} for none
*/
public java.lang.String getName() {
return name;
}
/**
* Required. The name of this vulnerability.
* @param name name or {@code null} for none
*/
public WindowsDetail setName(java.lang.String name) {
this.name = name;
return this;
}
@Override
public WindowsDetail set(String fieldName, Object value) {
return (WindowsDetail) super.set(fieldName, value);
}
@Override
public WindowsDetail clone() {
return (WindowsDetail) super.clone();
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy