scanoss 1.31.5__py3-none-any.whl → 1.34.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- protoc_gen_swagger/options/annotations_pb2.py +18 -12
- protoc_gen_swagger/options/annotations_pb2.pyi +48 -0
- protoc_gen_swagger/options/annotations_pb2_grpc.py +20 -0
- protoc_gen_swagger/options/openapiv2_pb2.py +110 -99
- protoc_gen_swagger/options/openapiv2_pb2.pyi +1317 -0
- protoc_gen_swagger/options/openapiv2_pb2_grpc.py +20 -0
- scanoss/__init__.py +1 -1
- scanoss/api/common/v2/scanoss_common_pb2.py +8 -6
- scanoss/api/common/v2/scanoss_common_pb2_grpc.py +5 -1
- scanoss/api/components/v2/scanoss_components_pb2.py +46 -32
- scanoss/api/components/v2/scanoss_components_pb2_grpc.py +6 -6
- scanoss/api/cryptography/v2/scanoss_cryptography_pb2.py +107 -29
- scanoss/api/cryptography/v2/scanoss_cryptography_pb2_grpc.py +545 -9
- scanoss/api/dependencies/v2/scanoss_dependencies_pb2.py +29 -21
- scanoss/api/dependencies/v2/scanoss_dependencies_pb2_grpc.py +1 -0
- scanoss/api/geoprovenance/v2/scanoss_geoprovenance_pb2.py +51 -19
- scanoss/api/geoprovenance/v2/scanoss_geoprovenance_pb2_grpc.py +189 -1
- scanoss/api/licenses/v2/scanoss_licenses_pb2.py +27 -27
- scanoss/api/scanning/v2/scanoss_scanning_pb2.py +18 -18
- scanoss/api/semgrep/v2/scanoss_semgrep_pb2.py +29 -13
- scanoss/api/semgrep/v2/scanoss_semgrep_pb2_grpc.py +102 -8
- scanoss/api/vulnerabilities/v2/scanoss_vulnerabilities_pb2.py +21 -21
- scanoss/cli.py +196 -144
- scanoss/components.py +80 -50
- scanoss/cryptography.py +64 -44
- scanoss/cyclonedx.py +22 -0
- scanoss/data/build_date.txt +1 -1
- scanoss/scanner.py +3 -0
- scanoss/scanossapi.py +22 -24
- scanoss/scanossgrpc.py +538 -287
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/METADATA +4 -3
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/RECORD +36 -34
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/WHEEL +0 -0
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/entry_points.txt +0 -0
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/licenses/LICENSE +0 -0
- {scanoss-1.31.5.dist-info → scanoss-1.34.0.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,7 @@ from google.api import annotations_pb2 as google_dot_api_dot_annotations__pb2
|
|
|
27
27
|
from protoc_gen_openapiv2.options import annotations_pb2 as protoc__gen__openapiv2_dot_options_dot_annotations__pb2
|
|
28
28
|
|
|
29
29
|
|
|
30
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n.scanoss/api/scanning/v2/scanoss-scanning.proto\x12\x17scanoss.api.scanning.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"\
|
|
30
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n.scanoss/api/scanning/v2/scanoss-scanning.proto\x12\x17scanoss.api.scanning.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"\xde\x04\n\nHFHRequest\x12:\n\x04root\x18\x01 \x01(\x0b\x32,.scanoss.api.scanning.v2.HFHRequest.Children\x12&\n\x0erank_threshold\x18\x02 \x01(\x05R\x0erank_threshold\x12\x10\n\x08\x63\x61tegory\x18\x03 \x01(\t\x12\x13\n\x0bquery_limit\x18\x04 \x01(\x05\x12\x1b\n\x13recursive_threshold\x18\x05 \x01(\x02\x12\x1a\n\x12min_accepted_score\x18\x06 \x01(\x02\x1a\x8b\x03\n\x08\x43hildren\x12\x18\n\x07path_id\x18\x01 \x01(\tR\x07path_id\x12&\n\x0esim_hash_names\x18\x02 \x01(\tR\x0esim_hash_names\x12*\n\x10sim_hash_content\x18\x03 \x01(\tR\x10sim_hash_content\x12>\n\x08\x63hildren\x18\x04 \x03(\x0b\x32,.scanoss.api.scanning.v2.HFHRequest.Children\x12.\n\x12sim_hash_dir_names\x18\x05 \x01(\tR\x12sim_hash_dir_names\x12j\n\x0flang_extensions\x18\x06 \x03(\x0b\x32@.scanoss.api.scanning.v2.HFHRequest.Children.LangExtensionsEntryR\x0flang_extensions\x1a\x35\n\x13LangExtensionsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x05:\x02\x38\x01\"\xac\x03\n\x0bHFHResponse\x12<\n\x07results\x18\x01 \x03(\x0b\x32+.scanoss.api.scanning.v2.HFHResponse.Result\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse\x1a)\n\x07Version\x12\x0f\n\x07version\x18\x01 \x01(\t\x12\r\n\x05score\x18\x02 \x01(\x02\x1a\x94\x01\n\tComponent\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0c\n\x04name\x18\x02 \x01(\t\x12\x0e\n\x06vendor\x18\x03 \x01(\t\x12>\n\x08versions\x18\x04 \x03(\x0b\x32,.scanoss.api.scanning.v2.HFHResponse.Version\x12\x0c\n\x04rank\x18\x05 \x01(\x05\x12\r\n\x05order\x18\x06 \x01(\x05\x1a\x66\n\x06Result\x12\x18\n\x07path_id\x18\x01 \x01(\tR\x07path_id\x12\x42\n\ncomponents\x18\x02 \x03(\x0b\x32..scanoss.api.scanning.v2.HFHResponse.Component2\xf8\x01\n\x08Scanning\x12m\n\x04\x45\x63ho\x12\".scanoss.api.common.v2.EchoRequest\x1a#.scanoss.api.common.v2.EchoResponse\"\x1c\x82\xd3\xe4\x93\x02\x16\"\x11/v2/scanning/echo:\x01*\x12}\n\x0e\x46olderHashScan\x12#.scanoss.api.scanning.v2.HFHRequest\x1a$.scanoss.api.scanning.v2.HFHResponse\" \x82\xd3\xe4\x93\x02\x1a\"\x15/v2/scanning/hfh/scan:\x01*B\x8a\x02Z1github.com/scanoss/papi/api/scanningv2;scanningv2\x92\x41\xd3\x01\x12m\n\x18SCANOSS Scanning Service\"L\n\x10scanoss-scanning\x12#https://github.com/scanoss/scanning\x1a\x13support@scanoss.com2\x03\x32.0*\x01\x01\x32\x10\x61pplication/json:\x10\x61pplication/jsonR;\n\x03\x34\x30\x34\x12\x34\n*Returned when the resource does not exist.\x12\x06\n\x04\x9a\x02\x01\x07\x62\x06proto3')
|
|
31
31
|
|
|
32
32
|
_globals = globals()
|
|
33
33
|
_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
|
|
@@ -38,23 +38,23 @@ if not _descriptor._USE_C_DESCRIPTORS:
|
|
|
38
38
|
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._loaded_options = None
|
|
39
39
|
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._serialized_options = b'8\001'
|
|
40
40
|
_globals['_SCANNING'].methods_by_name['Echo']._loaded_options = None
|
|
41
|
-
_globals['_SCANNING'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002\
|
|
41
|
+
_globals['_SCANNING'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002\026\"\021/v2/scanning/echo:\001*'
|
|
42
42
|
_globals['_SCANNING'].methods_by_name['FolderHashScan']._loaded_options = None
|
|
43
|
-
_globals['_SCANNING'].methods_by_name['FolderHashScan']._serialized_options = b'\202\323\344\223\002\
|
|
43
|
+
_globals['_SCANNING'].methods_by_name['FolderHashScan']._serialized_options = b'\202\323\344\223\002\032\"\025/v2/scanning/hfh/scan:\001*'
|
|
44
44
|
_globals['_HFHREQUEST']._serialized_start=198
|
|
45
|
-
_globals['_HFHREQUEST']._serialized_end=
|
|
46
|
-
_globals['_HFHREQUEST_CHILDREN']._serialized_start=
|
|
47
|
-
_globals['_HFHREQUEST_CHILDREN']._serialized_end=
|
|
48
|
-
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._serialized_start=
|
|
49
|
-
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._serialized_end=
|
|
50
|
-
_globals['_HFHRESPONSE']._serialized_start=
|
|
51
|
-
_globals['_HFHRESPONSE']._serialized_end=
|
|
52
|
-
_globals['_HFHRESPONSE_VERSION']._serialized_start=
|
|
53
|
-
_globals['_HFHRESPONSE_VERSION']._serialized_end=
|
|
54
|
-
_globals['_HFHRESPONSE_COMPONENT']._serialized_start=
|
|
55
|
-
_globals['_HFHRESPONSE_COMPONENT']._serialized_end=
|
|
56
|
-
_globals['_HFHRESPONSE_RESULT']._serialized_start=
|
|
57
|
-
_globals['_HFHRESPONSE_RESULT']._serialized_end=
|
|
58
|
-
_globals['_SCANNING']._serialized_start=
|
|
59
|
-
_globals['_SCANNING']._serialized_end=
|
|
45
|
+
_globals['_HFHREQUEST']._serialized_end=804
|
|
46
|
+
_globals['_HFHREQUEST_CHILDREN']._serialized_start=409
|
|
47
|
+
_globals['_HFHREQUEST_CHILDREN']._serialized_end=804
|
|
48
|
+
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._serialized_start=751
|
|
49
|
+
_globals['_HFHREQUEST_CHILDREN_LANGEXTENSIONSENTRY']._serialized_end=804
|
|
50
|
+
_globals['_HFHRESPONSE']._serialized_start=807
|
|
51
|
+
_globals['_HFHRESPONSE']._serialized_end=1235
|
|
52
|
+
_globals['_HFHRESPONSE_VERSION']._serialized_start=939
|
|
53
|
+
_globals['_HFHRESPONSE_VERSION']._serialized_end=980
|
|
54
|
+
_globals['_HFHRESPONSE_COMPONENT']._serialized_start=983
|
|
55
|
+
_globals['_HFHRESPONSE_COMPONENT']._serialized_end=1131
|
|
56
|
+
_globals['_HFHRESPONSE_RESULT']._serialized_start=1133
|
|
57
|
+
_globals['_HFHRESPONSE_RESULT']._serialized_end=1235
|
|
58
|
+
_globals['_SCANNING']._serialized_start=1238
|
|
59
|
+
_globals['_SCANNING']._serialized_end=1486
|
|
60
60
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -27,7 +27,7 @@ from google.api import annotations_pb2 as google_dot_api_dot_annotations__pb2
|
|
|
27
27
|
from protoc_gen_openapiv2.options import annotations_pb2 as protoc__gen__openapiv2_dot_options_dot_annotations__pb2
|
|
28
28
|
|
|
29
29
|
|
|
30
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n,scanoss/api/semgrep/v2/scanoss-semgrep.proto\x12\x16scanoss.api.semgrep.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"\
|
|
30
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n,scanoss/api/semgrep/v2/scanoss-semgrep.proto\x12\x16scanoss.api.semgrep.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"C\n\x05Issue\x12\x0e\n\x06ruleID\x18\x01 \x01(\t\x12\x0c\n\x04\x66rom\x18\x02 \x01(\t\x12\n\n\x02to\x18\x03 \x01(\t\x12\x10\n\x08severity\x18\x04 \x01(\t\"T\n\x04\x46ile\x12\x0f\n\x07\x66ileMD5\x18\x01 \x01(\t\x12\x0c\n\x04path\x18\x02 \x01(\t\x12-\n\x06issues\x18\x03 \x03(\x0b\x32\x1d.scanoss.api.semgrep.v2.Issue\"\xdf\x01\n\x0fSemgrepResponse\x12<\n\x05purls\x18\x01 \x03(\x0b\x32-.scanoss.api.semgrep.v2.SemgrepResponse.Purls\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse\x1aS\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0f\n\x07version\x18\x02 \x01(\t\x12+\n\x05\x66iles\x18\x03 \x03(\x0b\x32\x1c.scanoss.api.semgrep.v2.File:\x02\x18\x01\"u\n\x12\x43omponentIssueInfo\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0f\n\x07version\x18\x02 \x01(\t\x12\x13\n\x0brequirement\x18\x03 \x01(\t\x12+\n\x05\x66iles\x18\x04 \x03(\x0b\x32\x1c.scanoss.api.semgrep.v2.File\"\xe6\x06\n\x17\x43omponentsIssueResponse\x12>\n\ncomponents\x18\x01 \x03(\x0b\x32*.scanoss.api.semgrep.v2.ComponentIssueInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\xd3\x05\x92\x41\xcf\x05\n\xcc\x05J\xc9\x05{\"components\":[{\"purl\":\"pkg:maven/org.apache.commons/commons-lang3\",\"version\":\"3.12.0\",\"requirement\":\"3.12.0\",\"files\":[{\"fileMD5\":\"a1b2c3d4e5f6\",\"path\":\"src/main/java/org/apache/commons/lang3/StringUtils.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.crypto.weak-hash\",\"from\":\"156\",\"to\":\"159\",\"severity\":\"WARNING\"},{\"ruleID\":\"java.lang.security.audit.sql-injection.sql-injection\",\"from\":\"284\",\"to\":\"286\",\"severity\":\"ERROR\"}]},{\"fileMD5\":\"b2c3d4e5f6a1\",\"path\":\"src/main/java/org/apache/commons/lang3/Validate.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.hardcoded-secret\",\"from\":\"95\",\"to\":\"95\",\"severity\":\"ERROR\"}]}]}],\"status\":{\"status\":\"SUCCESS\",\"message\":\"Security analysis completed successfully\"}}\"\xb9\x04\n\x16\x43omponentIssueResponse\x12=\n\tcomponent\x18\x01 \x01(\x0b\x32*.scanoss.api.semgrep.v2.ComponentIssueInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\xa8\x03\x92\x41\xa4\x03\n\xa1\x03J\x9e\x03{\"component\":{\"purl\":\"pkg:maven/org.apache.commons/commons-lang3\",\"version\":\"3.12.0\",\"requirement\":\"3.12.0\",\"files\":[{\"fileMD5\":\"a1b2c3d4e5f6\",\"path\":\"src/main/java/org/apache/commons/lang3/StringUtils.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.sql-injection.sql-injection\",\"from\":\"284\",\"to\":\"286\",\"severity\":\"ERROR\"}]}]},\"status\":{\"status\":\"SUCCESS\",\"message\":\"Security analysis completed successfully\"}}2\x89\x04\n\x07Semgrep\x12l\n\x04\x45\x63ho\x12\".scanoss.api.common.v2.EchoRequest\x1a#.scanoss.api.common.v2.EchoResponse\"\x1b\x82\xd3\xe4\x93\x02\x15\"\x10/v2/semgrep/echo:\x01*\x12]\n\tGetIssues\x12\".scanoss.api.common.v2.PurlRequest\x1a\'.scanoss.api.semgrep.v2.SemgrepResponse\"\x03\x88\x02\x01\x12\x9a\x01\n\x13GetComponentsIssues\x12(.scanoss.api.common.v2.ComponentsRequest\x1a/.scanoss.api.semgrep.v2.ComponentsIssueResponse\"(\x82\xd3\xe4\x93\x02\"\"\x1d/v2/semgrep/issues/components:\x01*\x12\x93\x01\n\x12GetComponentIssues\x12\'.scanoss.api.common.v2.ComponentRequest\x1a..scanoss.api.semgrep.v2.ComponentIssueResponse\"$\x82\xd3\xe4\x93\x02\x1e\x12\x1c/v2/semgrep/issues/componentB\x85\x02Z/github.com/scanoss/papi/api/semgrepv2;semgrepv2\x92\x41\xd0\x01\x12j\n\x17SCANOSS Semgrep Service\"J\n\x0fscanoss-semgrep\x12\"https://github.com/scanoss/semgrep\x1a\x13support@scanoss.com2\x03\x32.0*\x01\x01\x32\x10\x61pplication/json:\x10\x61pplication/jsonR;\n\x03\x34\x30\x34\x12\x34\n*Returned when the resource does not exist.\x12\x06\n\x04\x9a\x02\x01\x07\x62\x06proto3')
|
|
31
31
|
|
|
32
32
|
_globals = globals()
|
|
33
33
|
_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
|
|
@@ -35,18 +35,34 @@ _builder.BuildTopDescriptorsAndMessages(DESCRIPTOR, 'scanoss.api.semgrep.v2.scan
|
|
|
35
35
|
if not _descriptor._USE_C_DESCRIPTORS:
|
|
36
36
|
_globals['DESCRIPTOR']._loaded_options = None
|
|
37
37
|
_globals['DESCRIPTOR']._serialized_options = b'Z/github.com/scanoss/papi/api/semgrepv2;semgrepv2\222A\320\001\022j\n\027SCANOSS Semgrep Service\"J\n\017scanoss-semgrep\022\"https://github.com/scanoss/semgrep\032\023support@scanoss.com2\0032.0*\001\0012\020application/json:\020application/jsonR;\n\003404\0224\n*Returned when the resource does not exist.\022\006\n\004\232\002\001\007'
|
|
38
|
+
_globals['_SEMGREPRESPONSE']._loaded_options = None
|
|
39
|
+
_globals['_SEMGREPRESPONSE']._serialized_options = b'\030\001'
|
|
40
|
+
_globals['_COMPONENTSISSUERESPONSE']._loaded_options = None
|
|
41
|
+
_globals['_COMPONENTSISSUERESPONSE']._serialized_options = b'\222A\317\005\n\314\005J\311\005{\"components\":[{\"purl\":\"pkg:maven/org.apache.commons/commons-lang3\",\"version\":\"3.12.0\",\"requirement\":\"3.12.0\",\"files\":[{\"fileMD5\":\"a1b2c3d4e5f6\",\"path\":\"src/main/java/org/apache/commons/lang3/StringUtils.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.crypto.weak-hash\",\"from\":\"156\",\"to\":\"159\",\"severity\":\"WARNING\"},{\"ruleID\":\"java.lang.security.audit.sql-injection.sql-injection\",\"from\":\"284\",\"to\":\"286\",\"severity\":\"ERROR\"}]},{\"fileMD5\":\"b2c3d4e5f6a1\",\"path\":\"src/main/java/org/apache/commons/lang3/Validate.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.hardcoded-secret\",\"from\":\"95\",\"to\":\"95\",\"severity\":\"ERROR\"}]}]}],\"status\":{\"status\":\"SUCCESS\",\"message\":\"Security analysis completed successfully\"}}'
|
|
42
|
+
_globals['_COMPONENTISSUERESPONSE']._loaded_options = None
|
|
43
|
+
_globals['_COMPONENTISSUERESPONSE']._serialized_options = b'\222A\244\003\n\241\003J\236\003{\"component\":{\"purl\":\"pkg:maven/org.apache.commons/commons-lang3\",\"version\":\"3.12.0\",\"requirement\":\"3.12.0\",\"files\":[{\"fileMD5\":\"a1b2c3d4e5f6\",\"path\":\"src/main/java/org/apache/commons/lang3/StringUtils.java\",\"issues\":[{\"ruleID\":\"java.lang.security.audit.sql-injection.sql-injection\",\"from\":\"284\",\"to\":\"286\",\"severity\":\"ERROR\"}]}]},\"status\":{\"status\":\"SUCCESS\",\"message\":\"Security analysis completed successfully\"}}'
|
|
38
44
|
_globals['_SEMGREP'].methods_by_name['Echo']._loaded_options = None
|
|
39
|
-
_globals['_SEMGREP'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002\
|
|
45
|
+
_globals['_SEMGREP'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002\025\"\020/v2/semgrep/echo:\001*'
|
|
40
46
|
_globals['_SEMGREP'].methods_by_name['GetIssues']._loaded_options = None
|
|
41
|
-
_globals['_SEMGREP'].methods_by_name['GetIssues']._serialized_options = b'\
|
|
42
|
-
_globals['
|
|
43
|
-
_globals['
|
|
44
|
-
_globals['
|
|
45
|
-
_globals['
|
|
46
|
-
_globals['
|
|
47
|
-
_globals['
|
|
48
|
-
_globals['
|
|
49
|
-
_globals['
|
|
50
|
-
_globals['
|
|
51
|
-
_globals['
|
|
47
|
+
_globals['_SEMGREP'].methods_by_name['GetIssues']._serialized_options = b'\210\002\001'
|
|
48
|
+
_globals['_SEMGREP'].methods_by_name['GetComponentsIssues']._loaded_options = None
|
|
49
|
+
_globals['_SEMGREP'].methods_by_name['GetComponentsIssues']._serialized_options = b'\202\323\344\223\002\"\"\035/v2/semgrep/issues/components:\001*'
|
|
50
|
+
_globals['_SEMGREP'].methods_by_name['GetComponentIssues']._loaded_options = None
|
|
51
|
+
_globals['_SEMGREP'].methods_by_name['GetComponentIssues']._serialized_options = b'\202\323\344\223\002\036\022\034/v2/semgrep/issues/component'
|
|
52
|
+
_globals['_ISSUE']._serialized_start=194
|
|
53
|
+
_globals['_ISSUE']._serialized_end=261
|
|
54
|
+
_globals['_FILE']._serialized_start=263
|
|
55
|
+
_globals['_FILE']._serialized_end=347
|
|
56
|
+
_globals['_SEMGREPRESPONSE']._serialized_start=350
|
|
57
|
+
_globals['_SEMGREPRESPONSE']._serialized_end=573
|
|
58
|
+
_globals['_SEMGREPRESPONSE_PURLS']._serialized_start=486
|
|
59
|
+
_globals['_SEMGREPRESPONSE_PURLS']._serialized_end=569
|
|
60
|
+
_globals['_COMPONENTISSUEINFO']._serialized_start=575
|
|
61
|
+
_globals['_COMPONENTISSUEINFO']._serialized_end=692
|
|
62
|
+
_globals['_COMPONENTSISSUERESPONSE']._serialized_start=695
|
|
63
|
+
_globals['_COMPONENTSISSUERESPONSE']._serialized_end=1565
|
|
64
|
+
_globals['_COMPONENTISSUERESPONSE']._serialized_start=1568
|
|
65
|
+
_globals['_COMPONENTISSUERESPONSE']._serialized_end=2137
|
|
66
|
+
_globals['_SEMGREP']._serialized_start=2140
|
|
67
|
+
_globals['_SEMGREP']._serialized_end=2661
|
|
52
68
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -27,8 +27,8 @@ if _version_not_supported:
|
|
|
27
27
|
|
|
28
28
|
|
|
29
29
|
class SemgrepStub(object):
|
|
30
|
-
"""
|
|
31
|
-
Expose all of the SCANOSS
|
|
30
|
+
"""*
|
|
31
|
+
Expose all of the SCANOSS Semgrep Security Analysis RPCs here
|
|
32
32
|
"""
|
|
33
33
|
|
|
34
34
|
def __init__(self, channel):
|
|
@@ -47,22 +47,52 @@ class SemgrepStub(object):
|
|
|
47
47
|
request_serializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.PurlRequest.SerializeToString,
|
|
48
48
|
response_deserializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.SemgrepResponse.FromString,
|
|
49
49
|
_registered_method=True)
|
|
50
|
+
self.GetComponentsIssues = channel.unary_unary(
|
|
51
|
+
'/scanoss.api.semgrep.v2.Semgrep/GetComponentsIssues',
|
|
52
|
+
request_serializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentsRequest.SerializeToString,
|
|
53
|
+
response_deserializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentsIssueResponse.FromString,
|
|
54
|
+
_registered_method=True)
|
|
55
|
+
self.GetComponentIssues = channel.unary_unary(
|
|
56
|
+
'/scanoss.api.semgrep.v2.Semgrep/GetComponentIssues',
|
|
57
|
+
request_serializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentRequest.SerializeToString,
|
|
58
|
+
response_deserializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentIssueResponse.FromString,
|
|
59
|
+
_registered_method=True)
|
|
50
60
|
|
|
51
61
|
|
|
52
62
|
class SemgrepServicer(object):
|
|
53
|
-
"""
|
|
54
|
-
Expose all of the SCANOSS
|
|
63
|
+
"""*
|
|
64
|
+
Expose all of the SCANOSS Semgrep Security Analysis RPCs here
|
|
55
65
|
"""
|
|
56
66
|
|
|
57
67
|
def Echo(self, request, context):
|
|
58
|
-
"""Standard
|
|
68
|
+
"""Standard health check endpoint to verify service availability and connectivity
|
|
59
69
|
"""
|
|
60
70
|
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
|
61
71
|
context.set_details('Method not implemented!')
|
|
62
72
|
raise NotImplementedError('Method not implemented!')
|
|
63
73
|
|
|
64
74
|
def GetIssues(self, request, context):
|
|
65
|
-
"""Get
|
|
75
|
+
"""[DEPRECATED] Get potential security issues associated with a list of PURLs
|
|
76
|
+
This method accepts PURL-based requests and is deprecated in favor of GetComponentsIssues
|
|
77
|
+
which accepts ComponentsRequest for better component identification
|
|
78
|
+
"""
|
|
79
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
|
80
|
+
context.set_details('Method not implemented!')
|
|
81
|
+
raise NotImplementedError('Method not implemented!')
|
|
82
|
+
|
|
83
|
+
def GetComponentsIssues(self, request, context):
|
|
84
|
+
"""Get potential security issues associated with multiple components
|
|
85
|
+
This is the current method that accepts ComponentsRequest for enhanced component identification
|
|
86
|
+
Replaces the deprecated GetIssues method
|
|
87
|
+
"""
|
|
88
|
+
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
|
89
|
+
context.set_details('Method not implemented!')
|
|
90
|
+
raise NotImplementedError('Method not implemented!')
|
|
91
|
+
|
|
92
|
+
def GetComponentIssues(self, request, context):
|
|
93
|
+
"""Get potential security issues associated with a single component
|
|
94
|
+
This is the current method that accepts ComponentRequest for enhanced component identification
|
|
95
|
+
Replaces the deprecated GetIssues method for single component queries
|
|
66
96
|
"""
|
|
67
97
|
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
|
|
68
98
|
context.set_details('Method not implemented!')
|
|
@@ -81,6 +111,16 @@ def add_SemgrepServicer_to_server(servicer, server):
|
|
|
81
111
|
request_deserializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.PurlRequest.FromString,
|
|
82
112
|
response_serializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.SemgrepResponse.SerializeToString,
|
|
83
113
|
),
|
|
114
|
+
'GetComponentsIssues': grpc.unary_unary_rpc_method_handler(
|
|
115
|
+
servicer.GetComponentsIssues,
|
|
116
|
+
request_deserializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentsRequest.FromString,
|
|
117
|
+
response_serializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentsIssueResponse.SerializeToString,
|
|
118
|
+
),
|
|
119
|
+
'GetComponentIssues': grpc.unary_unary_rpc_method_handler(
|
|
120
|
+
servicer.GetComponentIssues,
|
|
121
|
+
request_deserializer=scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentRequest.FromString,
|
|
122
|
+
response_serializer=scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentIssueResponse.SerializeToString,
|
|
123
|
+
),
|
|
84
124
|
}
|
|
85
125
|
generic_handler = grpc.method_handlers_generic_handler(
|
|
86
126
|
'scanoss.api.semgrep.v2.Semgrep', rpc_method_handlers)
|
|
@@ -90,8 +130,8 @@ def add_SemgrepServicer_to_server(servicer, server):
|
|
|
90
130
|
|
|
91
131
|
# This class is part of an EXPERIMENTAL API.
|
|
92
132
|
class Semgrep(object):
|
|
93
|
-
"""
|
|
94
|
-
Expose all of the SCANOSS
|
|
133
|
+
"""*
|
|
134
|
+
Expose all of the SCANOSS Semgrep Security Analysis RPCs here
|
|
95
135
|
"""
|
|
96
136
|
|
|
97
137
|
@staticmethod
|
|
@@ -147,3 +187,57 @@ class Semgrep(object):
|
|
|
147
187
|
timeout,
|
|
148
188
|
metadata,
|
|
149
189
|
_registered_method=True)
|
|
190
|
+
|
|
191
|
+
@staticmethod
|
|
192
|
+
def GetComponentsIssues(request,
|
|
193
|
+
target,
|
|
194
|
+
options=(),
|
|
195
|
+
channel_credentials=None,
|
|
196
|
+
call_credentials=None,
|
|
197
|
+
insecure=False,
|
|
198
|
+
compression=None,
|
|
199
|
+
wait_for_ready=None,
|
|
200
|
+
timeout=None,
|
|
201
|
+
metadata=None):
|
|
202
|
+
return grpc.experimental.unary_unary(
|
|
203
|
+
request,
|
|
204
|
+
target,
|
|
205
|
+
'/scanoss.api.semgrep.v2.Semgrep/GetComponentsIssues',
|
|
206
|
+
scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentsRequest.SerializeToString,
|
|
207
|
+
scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentsIssueResponse.FromString,
|
|
208
|
+
options,
|
|
209
|
+
channel_credentials,
|
|
210
|
+
insecure,
|
|
211
|
+
call_credentials,
|
|
212
|
+
compression,
|
|
213
|
+
wait_for_ready,
|
|
214
|
+
timeout,
|
|
215
|
+
metadata,
|
|
216
|
+
_registered_method=True)
|
|
217
|
+
|
|
218
|
+
@staticmethod
|
|
219
|
+
def GetComponentIssues(request,
|
|
220
|
+
target,
|
|
221
|
+
options=(),
|
|
222
|
+
channel_credentials=None,
|
|
223
|
+
call_credentials=None,
|
|
224
|
+
insecure=False,
|
|
225
|
+
compression=None,
|
|
226
|
+
wait_for_ready=None,
|
|
227
|
+
timeout=None,
|
|
228
|
+
metadata=None):
|
|
229
|
+
return grpc.experimental.unary_unary(
|
|
230
|
+
request,
|
|
231
|
+
target,
|
|
232
|
+
'/scanoss.api.semgrep.v2.Semgrep/GetComponentIssues',
|
|
233
|
+
scanoss_dot_api_dot_common_dot_v2_dot_scanoss__common__pb2.ComponentRequest.SerializeToString,
|
|
234
|
+
scanoss_dot_api_dot_semgrep_dot_v2_dot_scanoss__semgrep__pb2.ComponentIssueResponse.FromString,
|
|
235
|
+
options,
|
|
236
|
+
channel_credentials,
|
|
237
|
+
insecure,
|
|
238
|
+
call_credentials,
|
|
239
|
+
compression,
|
|
240
|
+
wait_for_ready,
|
|
241
|
+
timeout,
|
|
242
|
+
metadata,
|
|
243
|
+
_registered_method=True)
|
|
@@ -27,7 +27,7 @@ from google.api import annotations_pb2 as google_dot_api_dot_annotations__pb2
|
|
|
27
27
|
from protoc_gen_openapiv2.options import annotations_pb2 as protoc__gen__openapiv2_dot_options_dot_annotations__pb2
|
|
28
28
|
|
|
29
29
|
|
|
30
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n<scanoss/api/vulnerabilities/v2/scanoss-vulnerabilities.proto\x12\x1escanoss.api.vulnerabilities.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"\x91\x01\n\x14VulnerabilityRequest\x12I\n\x05purls\x18\x01 \x03(\x0b\x32:.scanoss.api.vulnerabilities.v2.VulnerabilityRequest.Purls\x1a*\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x13\n\x0brequirement\x18\x02 \x01(\t:\x02\x18\x01\"\xaf\x01\n\x0b\x43peResponse\x12@\n\x05purls\x18\x01 \x03(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.CpeResponse.Purls\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse\x1a#\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0c\n\x04\x63pes\x18\x02 \x03(\t:\x02\x18\x01\"U\n\x11\x43omponentCpesInfo\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0f\n\x07version\x18\x02 \x01(\t\x12\x13\n\x0brequirement\x18\x03 \x01(\t\x12\x0c\n\x04\x63pes\x18\x04 \x03(\t\"\x8b\x03\n\x15\x43omponentCpesResponse\x12\x44\n\tcomponent\x18\x01 \x01(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.ComponentCpesInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\xf4\x01\x92\x41\xf0\x01\n\xed\x01J\xea\x01{\"component\":{\"purl\": \"pkg:github/scanoss/engine@1.0.0\", \"requirement\": \"1.0.0\", \"version\": \"1.0.0\", \"cpes\": [\"cpe:2.3:a:scanoss:engine:1.0.0:*:*:*:*:*:*:*\"]}, \"status\": {\"status\": \"SUCCESS\", \"message\": \"CPEs Successfully retrieved\"}}\"\xa7\x04\n\x16\x43omponentsCpesResponse\x12\x45\n\ncomponents\x18\x01 \x03(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.ComponentCpesInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\x8e\x03\x92\x41\x8a\x03\n\x87\x03J\x84\x03{\"components\":[{\"purl\": \"pkg:github/scanoss/engine\", \"requirement=\": \"1.0.0\", \"version=\": \"1.0.0\", \"cpes\": [\"cpe:2.3:a:scanoss:engine:1.0.0:*:*:*:*:*:*:*\"]}, {\"purl\": \"pkg:github/scanoss/scanoss.py@v1.30.0\",\"requirement\": \"\",\"version\": \"v1.30.0\", \"cpes\": [\"cpe:2.3:a:scanoss:scanoss.py:1.30.0:*:*:*:*:*:*:*\"]} ], \"status\": {\"status\": \"SUCCESS\", \"message\": \"CPEs Successfully retrieved\"}}\"
|
|
30
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n<scanoss/api/vulnerabilities/v2/scanoss-vulnerabilities.proto\x12\x1escanoss.api.vulnerabilities.v2\x1a*scanoss/api/common/v2/scanoss-common.proto\x1a\x1cgoogle/api/annotations.proto\x1a.protoc-gen-openapiv2/options/annotations.proto\"\x91\x01\n\x14VulnerabilityRequest\x12I\n\x05purls\x18\x01 \x03(\x0b\x32:.scanoss.api.vulnerabilities.v2.VulnerabilityRequest.Purls\x1a*\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x13\n\x0brequirement\x18\x02 \x01(\t:\x02\x18\x01\"\xaf\x01\n\x0b\x43peResponse\x12@\n\x05purls\x18\x01 \x03(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.CpeResponse.Purls\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse\x1a#\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0c\n\x04\x63pes\x18\x02 \x03(\t:\x02\x18\x01\"U\n\x11\x43omponentCpesInfo\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0f\n\x07version\x18\x02 \x01(\t\x12\x13\n\x0brequirement\x18\x03 \x01(\t\x12\x0c\n\x04\x63pes\x18\x04 \x03(\t\"\x8b\x03\n\x15\x43omponentCpesResponse\x12\x44\n\tcomponent\x18\x01 \x01(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.ComponentCpesInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\xf4\x01\x92\x41\xf0\x01\n\xed\x01J\xea\x01{\"component\":{\"purl\": \"pkg:github/scanoss/engine@1.0.0\", \"requirement\": \"1.0.0\", \"version\": \"1.0.0\", \"cpes\": [\"cpe:2.3:a:scanoss:engine:1.0.0:*:*:*:*:*:*:*\"]}, \"status\": {\"status\": \"SUCCESS\", \"message\": \"CPEs Successfully retrieved\"}}\"\xa7\x04\n\x16\x43omponentsCpesResponse\x12\x45\n\ncomponents\x18\x01 \x03(\x0b\x32\x31.scanoss.api.vulnerabilities.v2.ComponentCpesInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\x8e\x03\x92\x41\x8a\x03\n\x87\x03J\x84\x03{\"components\":[{\"purl\": \"pkg:github/scanoss/engine\", \"requirement=\": \"1.0.0\", \"version=\": \"1.0.0\", \"cpes\": [\"cpe:2.3:a:scanoss:engine:1.0.0:*:*:*:*:*:*:*\"]}, {\"purl\": \"pkg:github/scanoss/scanoss.py@v1.30.0\",\"requirement\": \"\",\"version\": \"v1.30.0\", \"cpes\": [\"cpe:2.3:a:scanoss:scanoss.py:1.30.0:*:*:*:*:*:*:*\"]} ], \"status\": {\"status\": \"SUCCESS\", \"message\": \"CPEs Successfully retrieved\"}}\"Z\n\x04\x43VSS\x12\x0c\n\x04\x63vss\x18\x01 \x01(\t\x12\x1e\n\ncvss_score\x18\x02 \x01(\x02R\ncvss_score\x12$\n\rcvss_severity\x18\x03 \x01(\tR\rcvss_severity\"\xc1\x01\n\rVulnerability\x12\n\n\x02id\x18\x01 \x01(\t\x12\x0b\n\x03\x63ve\x18\x02 \x01(\t\x12\x0b\n\x03url\x18\x03 \x01(\t\x12\x0f\n\x07summary\x18\x04 \x01(\t\x12\x10\n\x08severity\x18\x05 \x01(\t\x12\x11\n\tpublished\x18\x06 \x01(\t\x12\x10\n\x08modified\x18\x07 \x01(\t\x12\x0e\n\x06source\x18\x08 \x01(\t\x12\x32\n\x04\x63vss\x18\t \x03(\x0b\x32$.scanoss.api.vulnerabilities.v2.CVSS\"\xfd\x01\n\x15VulnerabilityResponse\x12J\n\x05purls\x18\x01 \x03(\x0b\x32;.scanoss.api.vulnerabilities.v2.VulnerabilityResponse.Purls\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse\x1a]\n\x05Purls\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x46\n\x0fvulnerabilities\x18\x02 \x03(\x0b\x32-.scanoss.api.vulnerabilities.v2.Vulnerability:\x02\x18\x01\"\x98\x01\n\x1a\x43omponentVulnerabilityInfo\x12\x0c\n\x04purl\x18\x01 \x01(\t\x12\x0f\n\x07version\x18\x02 \x01(\t\x12\x13\n\x0brequirement\x18\x03 \x01(\t\x12\x46\n\x0fvulnerabilities\x18\x04 \x03(\x0b\x32-.scanoss.api.vulnerabilities.v2.Vulnerability\"\xe3\x05\n\x1e\x43omponentVulnerabilityResponse\x12M\n\tcomponent\x18\x01 \x01(\x0b\x32:.scanoss.api.vulnerabilities.v2.ComponentVulnerabilityInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\xba\x04\x92\x41\xb6\x04\n\xb3\x04J\xb0\x04{\"component\":{\"purl\": \"pkg:github/scanoss/engine\", \"requirement\": \"=>1.0.0\", \"version\": \"1.0.0\", \"vulnerabilities\": [{\"id\": \"DLA-2640-1\", \"cve\": \"DLA-2640-1\", \"url\": \"https://osv.dev/vulnerability/DLA-2640-1\", \"summary\": \"gst-plugins-good1.0 - security update\", \"severity\": \"Critical\", \"published\": \"2021-04-26\", \"modified\": \"2025-05-26\", \"source\": \"OSV\", \"cvss\": [{\"cvss\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"cvss_score\": 9.8, \"cvss_severity\": \"Critical\"}]}]}, \"status\": {\"status\": \"SUCCESS\", \"message\": \"Vulnerabilities Successfully retrieved\"}}\"\xbd\t\n\x1f\x43omponentsVulnerabilityResponse\x12N\n\ncomponents\x18\x01 \x03(\x0b\x32:.scanoss.api.vulnerabilities.v2.ComponentVulnerabilityInfo\x12\x35\n\x06status\x18\x02 \x01(\x0b\x32%.scanoss.api.common.v2.StatusResponse:\x92\x08\x92\x41\x8e\x08\n\x8b\x08J\x88\x08{\"components\":[{\"purl\": \"pkg:github/scanoss/engine\", \"requirement\": \"1.0.0\", \"version\": \"1.0.0\", \"vulnerabilities\": [{\"id\": \"DLA-2640-1\", \"cve\": \"DLA-2640-1\", \"url\": \"https://osv.dev/vulnerability/DLA-2640-1\", \"summary\": \"gst-plugins-good1.0 - security update\", \"severity\": \"Critical\", \"published\": \"2021-04-26\", \"modified\": \"2025-05-26\", \"source\": \"OSV\", \"cvss\": [{\"cvss\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"cvss_score\": 9.8, \"cvss_severity\": \"Critical\"}]}]}, {\"purl\": \"pkg:github/scanoss/scanoss.py\",\"requirement\": \"v1.30.0\",\"version\": \"v1.30.0\", \"vulnerabilities\": [{\"id\": \"CVE-2024-54321\", \"cve\": \"CVE-2024-54321\", \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2024-54321\", \"summary\": \"Denial of service vulnerability\", \"severity\": \"Medium\", \"published\": \"2024-01-15\", \"modified\": \"2024-02-01\", \"source\": \"NDV\", \"cvss\": [{\"cvss\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"cvss_score\": 4.3, \"cvss_severity\": \"Medium\"}]}]}], \"status\": {\"status\": \"SUCCESS\", \"message\": \"Vulnerabilities Successfully retrieved\"}}2\xb3\x08\n\x0fVulnerabilities\x12t\n\x04\x45\x63ho\x12\".scanoss.api.common.v2.EchoRequest\x1a#.scanoss.api.common.v2.EchoResponse\"#\x82\xd3\xe4\x93\x02\x1d\"\x18/v2/vulnerabilities/echo:\x01*\x12q\n\x07GetCpes\x12\x34.scanoss.api.vulnerabilities.v2.VulnerabilityRequest\x1a+.scanoss.api.vulnerabilities.v2.CpeResponse\"\x03\x88\x02\x01\x12\x9e\x01\n\x10GetComponentCpes\x12\'.scanoss.api.common.v2.ComponentRequest\x1a\x35.scanoss.api.vulnerabilities.v2.ComponentCpesResponse\"*\x82\xd3\xe4\x93\x02$\x12\"/v2/vulnerabilities/cpes/component\x12\xa5\x01\n\x11GetComponentsCpes\x12(.scanoss.api.common.v2.ComponentsRequest\x1a\x36.scanoss.api.vulnerabilities.v2.ComponentsCpesResponse\".\x82\xd3\xe4\x93\x02(\"#/v2/vulnerabilities/cpes/components:\x01*\x12\x86\x01\n\x12GetVulnerabilities\x12\x34.scanoss.api.vulnerabilities.v2.VulnerabilityRequest\x1a\x35.scanoss.api.vulnerabilities.v2.VulnerabilityResponse\"\x03\x88\x02\x01\x12\xad\x01\n\x1bGetComponentVulnerabilities\x12\'.scanoss.api.common.v2.ComponentRequest\x1a>.scanoss.api.vulnerabilities.v2.ComponentVulnerabilityResponse\"%\x82\xd3\xe4\x93\x02\x1f\x12\x1d/v2/vulnerabilities/component\x12\xb4\x01\n\x1cGetComponentsVulnerabilities\x12(.scanoss.api.common.v2.ComponentsRequest\x1a?.scanoss.api.vulnerabilities.v2.ComponentsVulnerabilityResponse\")\x82\xd3\xe4\x93\x02#\"\x1e/v2/vulnerabilities/components:\x01*B\x92\x03Z?github.com/scanoss/papi/api/vulnerabilitiesv2;vulnerabilitiesv2\x92\x41\xcd\x02\x12\xd4\x01\n\x1dSCANOSS Vulnerability Service\x12RVulnerability service provides vulnerability intelligence for software components.\"Z\n\x17scanoss-vulnerabilities\x12*https://github.com/scanoss/vulnerabilities\x1a\x13support@scanoss.com2\x03\x32.0\x1a\x0f\x61pi.scanoss.com*\x02\x01\x02\x32\x10\x61pplication/json:\x10\x61pplication/jsonR;\n\x03\x34\x30\x34\x12\x34\n*Returned when the resource does not exist.\x12\x06\n\x04\x9a\x02\x01\x07\x62\x06proto3')
|
|
31
31
|
|
|
32
32
|
_globals = globals()
|
|
33
33
|
_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
|
|
@@ -50,19 +50,19 @@ if not _descriptor._USE_C_DESCRIPTORS:
|
|
|
50
50
|
_globals['_COMPONENTSVULNERABILITYRESPONSE']._loaded_options = None
|
|
51
51
|
_globals['_COMPONENTSVULNERABILITYRESPONSE']._serialized_options = b'\222A\216\010\n\213\010J\210\010{\"components\":[{\"purl\": \"pkg:github/scanoss/engine\", \"requirement\": \"1.0.0\", \"version\": \"1.0.0\", \"vulnerabilities\": [{\"id\": \"DLA-2640-1\", \"cve\": \"DLA-2640-1\", \"url\": \"https://osv.dev/vulnerability/DLA-2640-1\", \"summary\": \"gst-plugins-good1.0 - security update\", \"severity\": \"Critical\", \"published\": \"2021-04-26\", \"modified\": \"2025-05-26\", \"source\": \"OSV\", \"cvss\": [{\"cvss\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"cvss_score\": 9.8, \"cvss_severity\": \"Critical\"}]}]}, {\"purl\": \"pkg:github/scanoss/scanoss.py\",\"requirement\": \"v1.30.0\",\"version\": \"v1.30.0\", \"vulnerabilities\": [{\"id\": \"CVE-2024-54321\", \"cve\": \"CVE-2024-54321\", \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2024-54321\", \"summary\": \"Denial of service vulnerability\", \"severity\": \"Medium\", \"published\": \"2024-01-15\", \"modified\": \"2024-02-01\", \"source\": \"NDV\", \"cvss\": [{\"cvss\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"cvss_score\": 4.3, \"cvss_severity\": \"Medium\"}]}]}], \"status\": {\"status\": \"SUCCESS\", \"message\": \"Vulnerabilities Successfully retrieved\"}}'
|
|
52
52
|
_globals['_VULNERABILITIES'].methods_by_name['Echo']._loaded_options = None
|
|
53
|
-
_globals['_VULNERABILITIES'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002
|
|
53
|
+
_globals['_VULNERABILITIES'].methods_by_name['Echo']._serialized_options = b'\202\323\344\223\002\035\"\030/v2/vulnerabilities/echo:\001*'
|
|
54
54
|
_globals['_VULNERABILITIES'].methods_by_name['GetCpes']._loaded_options = None
|
|
55
55
|
_globals['_VULNERABILITIES'].methods_by_name['GetCpes']._serialized_options = b'\210\002\001'
|
|
56
56
|
_globals['_VULNERABILITIES'].methods_by_name['GetComponentCpes']._loaded_options = None
|
|
57
|
-
_globals['_VULNERABILITIES'].methods_by_name['GetComponentCpes']._serialized_options = b'\202\323\344\223\002
|
|
57
|
+
_globals['_VULNERABILITIES'].methods_by_name['GetComponentCpes']._serialized_options = b'\202\323\344\223\002$\022\"/v2/vulnerabilities/cpes/component'
|
|
58
58
|
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsCpes']._loaded_options = None
|
|
59
|
-
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsCpes']._serialized_options = b'\202\323\344\223\002
|
|
59
|
+
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsCpes']._serialized_options = b'\202\323\344\223\002(\"#/v2/vulnerabilities/cpes/components:\001*'
|
|
60
60
|
_globals['_VULNERABILITIES'].methods_by_name['GetVulnerabilities']._loaded_options = None
|
|
61
61
|
_globals['_VULNERABILITIES'].methods_by_name['GetVulnerabilities']._serialized_options = b'\210\002\001'
|
|
62
62
|
_globals['_VULNERABILITIES'].methods_by_name['GetComponentVulnerabilities']._loaded_options = None
|
|
63
|
-
_globals['_VULNERABILITIES'].methods_by_name['GetComponentVulnerabilities']._serialized_options = b'\202\323\344\223\002
|
|
63
|
+
_globals['_VULNERABILITIES'].methods_by_name['GetComponentVulnerabilities']._serialized_options = b'\202\323\344\223\002\037\022\035/v2/vulnerabilities/component'
|
|
64
64
|
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsVulnerabilities']._loaded_options = None
|
|
65
|
-
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsVulnerabilities']._serialized_options = b'\202\323\344\223\002
|
|
65
|
+
_globals['_VULNERABILITIES'].methods_by_name['GetComponentsVulnerabilities']._serialized_options = b'\202\323\344\223\002#\"\036/v2/vulnerabilities/components:\001*'
|
|
66
66
|
_globals['_VULNERABILITYREQUEST']._serialized_start=219
|
|
67
67
|
_globals['_VULNERABILITYREQUEST']._serialized_end=364
|
|
68
68
|
_globals['_VULNERABILITYREQUEST_PURLS']._serialized_start=318
|
|
@@ -78,19 +78,19 @@ if not _descriptor._USE_C_DESCRIPTORS:
|
|
|
78
78
|
_globals['_COMPONENTSCPESRESPONSE']._serialized_start=1030
|
|
79
79
|
_globals['_COMPONENTSCPESRESPONSE']._serialized_end=1581
|
|
80
80
|
_globals['_CVSS']._serialized_start=1583
|
|
81
|
-
_globals['_CVSS']._serialized_end=
|
|
82
|
-
_globals['_VULNERABILITY']._serialized_start=
|
|
83
|
-
_globals['_VULNERABILITY']._serialized_end=
|
|
84
|
-
_globals['_VULNERABILITYRESPONSE']._serialized_start=
|
|
85
|
-
_globals['_VULNERABILITYRESPONSE']._serialized_end=
|
|
86
|
-
_globals['_VULNERABILITYRESPONSE_PURLS']._serialized_start=
|
|
87
|
-
_globals['_VULNERABILITYRESPONSE_PURLS']._serialized_end=
|
|
88
|
-
_globals['_COMPONENTVULNERABILITYINFO']._serialized_start=
|
|
89
|
-
_globals['_COMPONENTVULNERABILITYINFO']._serialized_end=
|
|
90
|
-
_globals['_COMPONENTVULNERABILITYRESPONSE']._serialized_start=
|
|
91
|
-
_globals['_COMPONENTVULNERABILITYRESPONSE']._serialized_end=
|
|
92
|
-
_globals['_COMPONENTSVULNERABILITYRESPONSE']._serialized_start=
|
|
93
|
-
_globals['_COMPONENTSVULNERABILITYRESPONSE']._serialized_end=
|
|
94
|
-
_globals['_VULNERABILITIES']._serialized_start=
|
|
95
|
-
_globals['_VULNERABILITIES']._serialized_end=
|
|
81
|
+
_globals['_CVSS']._serialized_end=1673
|
|
82
|
+
_globals['_VULNERABILITY']._serialized_start=1676
|
|
83
|
+
_globals['_VULNERABILITY']._serialized_end=1869
|
|
84
|
+
_globals['_VULNERABILITYRESPONSE']._serialized_start=1872
|
|
85
|
+
_globals['_VULNERABILITYRESPONSE']._serialized_end=2125
|
|
86
|
+
_globals['_VULNERABILITYRESPONSE_PURLS']._serialized_start=2028
|
|
87
|
+
_globals['_VULNERABILITYRESPONSE_PURLS']._serialized_end=2121
|
|
88
|
+
_globals['_COMPONENTVULNERABILITYINFO']._serialized_start=2128
|
|
89
|
+
_globals['_COMPONENTVULNERABILITYINFO']._serialized_end=2280
|
|
90
|
+
_globals['_COMPONENTVULNERABILITYRESPONSE']._serialized_start=2283
|
|
91
|
+
_globals['_COMPONENTVULNERABILITYRESPONSE']._serialized_end=3022
|
|
92
|
+
_globals['_COMPONENTSVULNERABILITYRESPONSE']._serialized_start=3025
|
|
93
|
+
_globals['_COMPONENTSVULNERABILITYRESPONSE']._serialized_end=4238
|
|
94
|
+
_globals['_VULNERABILITIES']._serialized_start=4241
|
|
95
|
+
_globals['_VULNERABILITIES']._serialized_end=5316
|
|
96
96
|
# @@protoc_insertion_point(module_scope)
|