com.google.api.services.securitycenter.v1.model.GoogleCloudSecuritycenterV2ExfilResource Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.securitycenter.v1.model;
/**
* Resource where data was exfiltrated from or exfiltrated to.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Security Command Center API. For a detailed
* explanation see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class GoogleCloudSecuritycenterV2ExfilResource extends com.google.api.client.json.GenericJson {
/**
* Subcomponents of the asset that was exfiltrated, like URIs used during exfiltration, table
* names, databases, and filenames. For example, multiple tables might have been exfiltrated from
* the same Cloud SQL instance, or multiple files might have been exfiltrated from the same Cloud
* Storage bucket.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.util.List components;
/**
* The resource's [full resource
* name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String name;
/**
* Subcomponents of the asset that was exfiltrated, like URIs used during exfiltration, table
* names, databases, and filenames. For example, multiple tables might have been exfiltrated from
* the same Cloud SQL instance, or multiple files might have been exfiltrated from the same Cloud
* Storage bucket.
* @return value or {@code null} for none
*/
public java.util.List getComponents() {
return components;
}
/**
* Subcomponents of the asset that was exfiltrated, like URIs used during exfiltration, table
* names, databases, and filenames. For example, multiple tables might have been exfiltrated from
* the same Cloud SQL instance, or multiple files might have been exfiltrated from the same Cloud
* Storage bucket.
* @param components components or {@code null} for none
*/
public GoogleCloudSecuritycenterV2ExfilResource setComponents(java.util.List components) {
this.components = components;
return this;
}
/**
* The resource's [full resource
* name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
* @return value or {@code null} for none
*/
public java.lang.String getName() {
return name;
}
/**
* The resource's [full resource
* name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
* @param name name or {@code null} for none
*/
public GoogleCloudSecuritycenterV2ExfilResource setName(java.lang.String name) {
this.name = name;
return this;
}
@Override
public GoogleCloudSecuritycenterV2ExfilResource set(String fieldName, Object value) {
return (GoogleCloudSecuritycenterV2ExfilResource) super.set(fieldName, value);
}
@Override
public GoogleCloudSecuritycenterV2ExfilResource clone() {
return (GoogleCloudSecuritycenterV2ExfilResource) super.clone();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy