All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.api.services.securitycenter.v1.model.AttackPath Maven / Gradle / Ivy

There is a newer version: v1-rev20241111-2.0.0
Show newest version
/*
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
 * in compliance with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed under the License
 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
 * or implied. See the License for the specific language governing permissions and limitations under
 * the License.
 */
/*
 * This code was generated by https://github.com/googleapis/google-api-java-client-services/
 * Modify at your own risk.
 */

package com.google.api.services.securitycenter.v1.model;

/**
 * A path that an attacker could take to reach an exposed resource.
 *
 * 

This is the Java data model class that specifies how to parse/serialize into the JSON that is * transmitted over HTTP when working with the Security Command Center API. For a detailed * explanation see: * https://developers.google.com/api-client-library/java/google-http-java-client/json *

* * @author Google, Inc. */ @SuppressWarnings("javadoc") public final class AttackPath extends com.google.api.client.json.GenericJson { /** * A list of the edges between nodes in this attack path. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.util.List edges; /** * The attack path name, for example, * `organizations/12/simulation/34/valuedResources/56/attackPaths/78` * The value may be {@code null}. */ @com.google.api.client.util.Key private java.lang.String name; /** * A list of nodes that exist in this attack path. * The value may be {@code null}. */ @com.google.api.client.util.Key private java.util.List pathNodes; /** * A list of the edges between nodes in this attack path. * @return value or {@code null} for none */ public java.util.List getEdges() { return edges; } /** * A list of the edges between nodes in this attack path. * @param edges edges or {@code null} for none */ public AttackPath setEdges(java.util.List edges) { this.edges = edges; return this; } /** * The attack path name, for example, * `organizations/12/simulation/34/valuedResources/56/attackPaths/78` * @return value or {@code null} for none */ public java.lang.String getName() { return name; } /** * The attack path name, for example, * `organizations/12/simulation/34/valuedResources/56/attackPaths/78` * @param name name or {@code null} for none */ public AttackPath setName(java.lang.String name) { this.name = name; return this; } /** * A list of nodes that exist in this attack path. * @return value or {@code null} for none */ public java.util.List getPathNodes() { return pathNodes; } /** * A list of nodes that exist in this attack path. * @param pathNodes pathNodes or {@code null} for none */ public AttackPath setPathNodes(java.util.List pathNodes) { this.pathNodes = pathNodes; return this; } @Override public AttackPath set(String fieldName, Object value) { return (AttackPath) super.set(fieldName, value); } @Override public AttackPath clone() { return (AttackPath) super.clone(); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy