com.google.api.services.securitycenter.v1.model.AttackPath Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.securitycenter.v1.model;
/**
* A path that an attacker could take to reach an exposed resource.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Security Command Center API. For a detailed
* explanation see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class AttackPath extends com.google.api.client.json.GenericJson {
/**
* A list of the edges between nodes in this attack path.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.util.List edges;
/**
* The attack path name, for example,
* `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String name;
/**
* A list of nodes that exist in this attack path.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.util.List pathNodes;
/**
* A list of the edges between nodes in this attack path.
* @return value or {@code null} for none
*/
public java.util.List getEdges() {
return edges;
}
/**
* A list of the edges between nodes in this attack path.
* @param edges edges or {@code null} for none
*/
public AttackPath setEdges(java.util.List edges) {
this.edges = edges;
return this;
}
/**
* The attack path name, for example,
* `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
* @return value or {@code null} for none
*/
public java.lang.String getName() {
return name;
}
/**
* The attack path name, for example,
* `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
* @param name name or {@code null} for none
*/
public AttackPath setName(java.lang.String name) {
this.name = name;
return this;
}
/**
* A list of nodes that exist in this attack path.
* @return value or {@code null} for none
*/
public java.util.List getPathNodes() {
return pathNodes;
}
/**
* A list of nodes that exist in this attack path.
* @param pathNodes pathNodes or {@code null} for none
*/
public AttackPath setPathNodes(java.util.List pathNodes) {
this.pathNodes = pathNodes;
return this;
}
@Override
public AttackPath set(String fieldName, Object value) {
return (AttackPath) super.set(fieldName, value);
}
@Override
public AttackPath clone() {
return (AttackPath) super.clone();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy