All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.securitycenter.v2.ExfilResourceOrBuilder Maven / Gradle / Ivy

There is a newer version: 2.62.0
Show newest version
/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/securitycenter/v2/exfiltration.proto

// Protobuf Java Version: 3.25.3
package com.google.cloud.securitycenter.v2;

public interface ExfilResourceOrBuilder
    extends
    // @@protoc_insertion_point(interface_extends:google.cloud.securitycenter.v2.ExfilResource)
    com.google.protobuf.MessageOrBuilder {

  /**
   *
   *
   * 
   * The resource's [full resource
   * name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
   * 
* * string name = 1; * * @return The name. */ java.lang.String getName(); /** * * *
   * The resource's [full resource
   * name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
   * 
* * string name = 1; * * @return The bytes for name. */ com.google.protobuf.ByteString getNameBytes(); /** * * *
   * Subcomponents of the asset that was exfiltrated, like URIs used during
   * exfiltration, table names, databases, and filenames. For example, multiple
   * tables might have been exfiltrated from the same Cloud SQL instance, or
   * multiple files might have been exfiltrated from the same Cloud Storage
   * bucket.
   * 
* * repeated string components = 2; * * @return A list containing the components. */ java.util.List getComponentsList(); /** * * *
   * Subcomponents of the asset that was exfiltrated, like URIs used during
   * exfiltration, table names, databases, and filenames. For example, multiple
   * tables might have been exfiltrated from the same Cloud SQL instance, or
   * multiple files might have been exfiltrated from the same Cloud Storage
   * bucket.
   * 
* * repeated string components = 2; * * @return The count of components. */ int getComponentsCount(); /** * * *
   * Subcomponents of the asset that was exfiltrated, like URIs used during
   * exfiltration, table names, databases, and filenames. For example, multiple
   * tables might have been exfiltrated from the same Cloud SQL instance, or
   * multiple files might have been exfiltrated from the same Cloud Storage
   * bucket.
   * 
* * repeated string components = 2; * * @param index The index of the element to return. * @return The components at the given index. */ java.lang.String getComponents(int index); /** * * *
   * Subcomponents of the asset that was exfiltrated, like URIs used during
   * exfiltration, table names, databases, and filenames. For example, multiple
   * tables might have been exfiltrated from the same Cloud SQL instance, or
   * multiple files might have been exfiltrated from the same Cloud Storage
   * bucket.
   * 
* * repeated string components = 2; * * @param index The index of the value to return. * @return The bytes of the components at the given index. */ com.google.protobuf.ByteString getComponentsBytes(int index); }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy