All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.api.services.containeranalysis.v1.model.WindowsDetail Maven / Gradle / Ivy

/*
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
 * in compliance with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed under the License
 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
 * or implied. See the License for the specific language governing permissions and limitations under
 * the License.
 */
/*
 * This code was generated by https://github.com/googleapis/google-api-java-client-services/
 * Modify at your own risk.
 */

package com.google.api.services.containeranalysis.v1.model;

/**
 * Model definition for WindowsDetail.
 *
 * 

This is the Java data model class that specifies how to parse/serialize into the JSON that is * transmitted over HTTP when working with the Container Analysis API. For a detailed explanation * see: * https://developers.google.com/api-client-library/java/google-http-java-client/json *

* * @author Google, Inc. */ @SuppressWarnings("javadoc") public final class WindowsDetail extends com.google.api.client.json.GenericJson { /** * Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String cpeUri; /** * The description of this vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String description; /** * Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that * there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability. * Currently any listed KBs presence is considered a fix. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.util.List fixingKbs; static { // hack to force ProGuard to consider KnowledgeBase used, since otherwise it would be stripped out // see https://github.com/google/google-api-java-client/issues/543 com.google.api.client.util.Data.nullOf(KnowledgeBase.class); } /** * Required. The name of this vulnerability. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String name; /** * Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects. * @return value or {@code null} for none */ public java.lang.String getCpeUri() { return cpeUri; } /** * Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability affects. * @param cpeUri cpeUri or {@code null} for none */ public WindowsDetail setCpeUri(java.lang.String cpeUri) { this.cpeUri = cpeUri; return this; } /** * The description of this vulnerability. * @return value or {@code null} for none */ public java.lang.String getDescription() { return description; } /** * The description of this vulnerability. * @param description description or {@code null} for none */ public WindowsDetail setDescription(java.lang.String description) { this.description = description; return this; } /** * Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that * there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability. * Currently any listed KBs presence is considered a fix. * @return value or {@code null} for none */ public java.util.List getFixingKbs() { return fixingKbs; } /** * Required. The names of the KBs which have hotfixes to mitigate this vulnerability. Note that * there may be multiple hotfixes (and thus multiple KBs) that mitigate a given vulnerability. * Currently any listed KBs presence is considered a fix. * @param fixingKbs fixingKbs or {@code null} for none */ public WindowsDetail setFixingKbs(java.util.List fixingKbs) { this.fixingKbs = fixingKbs; return this; } /** * Required. The name of this vulnerability. * @return value or {@code null} for none */ public java.lang.String getName() { return name; } /** * Required. The name of this vulnerability. * @param name name or {@code null} for none */ public WindowsDetail setName(java.lang.String name) { this.name = name; return this; } @Override public WindowsDetail set(String fieldName, Object value) { return (WindowsDetail) super.set(fieldName, value); } @Override public WindowsDetail clone() { return (WindowsDetail) super.clone(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy