📂 File Browser

/AgentAI/vendor/google/apiclient-services/src/OnDemandScanning
☀️ Light Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AISkillAnalysisOccurrence.php
▶ Open 📄 View Source
🐘 AliasContext.php
▶ Open 📄 View Source
🐘 AnalysisCompleted.php
▶ Open 📄 View Source
🐘 AnalyzePackagesMetadata.php
▶ Open 📄 View Source
🐘 AnalyzePackagesMetadataV1.php
▶ Open 📄 View Source
🐘 AnalyzePackagesRequestV1.php
▶ Open 📄 View Source
🐘 AnalyzePackagesResponse.php
▶ Open 📄 View Source
🐘 AnalyzePackagesResponseV1.php
▶ Open 📄 View Source
🐘 Artifact.php
▶ Open 📄 View Source
🐘 AttestationOccurrence.php
▶ Open 📄 View Source
🐘 BaseImage.php
▶ Open 📄 View Source
🐘 Binary.php
▶ Open 📄 View Source
🐘 BinarySourceInfo.php
▶ Open 📄 View Source
🐘 BuildDefinition.php
▶ Open 📄 View Source
🐘 BuildMetadata.php
▶ Open 📄 View Source
🐘 BuildOccurrence.php
▶ Open 📄 View Source
🐘 BuildProvenance.php
▶ Open 📄 View Source
🐘 BuilderConfig.php
▶ Open 📄 View Source
🐘 CISAKnownExploitedVulnerabilities.php
▶ Open 📄 View Source
🐘 CVSS.php
▶ Open 📄 View Source
🐘 Category.php
▶ Open 📄 View Source
🐘 CloudRepoSourceContext.php
▶ Open 📄 View Source
🐘 Command.php
▶ Open 📄 View Source
🐘 Completeness.php
▶ Open 📄 View Source
🐘 ComplianceOccurrence.php
▶ Open 📄 View Source
🐘 ComplianceVersion.php
▶ Open 📄 View Source
🐘 DSSEAttestationOccurrence.php
▶ Open 📄 View Source
🐘 DeploymentOccurrence.php
▶ Open 📄 View Source
🐘 DiscoveryOccurrence.php
▶ Open 📄 View Source
🐘 Envelope.php
▶ Open 📄 View Source
🐘 EnvelopeSignature.php
▶ Open 📄 View Source
🐘 ExploitPredictionScoringSystem.php
▶ Open 📄 View Source
🐘 FileHashes.php
▶ Open 📄 View Source
🐘 FileLocation.php
▶ Open 📄 View Source
🐘 Finding.php
▶ Open 📄 View Source
🐘 Fingerprint.php
▶ Open 📄 View Source
🐘 GerritSourceContext.php
▶ Open 📄 View Source
🐘 GitSourceContext.php
▶ Open 📄 View Source
🐘 GrafeasV1BaseImage.php
▶ Open 📄 View Source
🐘 GrafeasV1FileLocation.php
▶ Open 📄 View Source
🐘 GrafeasV1LayerDetails.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaBuilder.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaCompleteness.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaConfigSource.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaInvocation.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaMaterial.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaMetadata.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaBuilder.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaCompleteness.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaConfigSource.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaInvocation.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaMaterial.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaMetadata.php
▶ Open 📄 View Source
🐘 Hash.php
▶ Open 📄 View Source
🐘 Identity.php
▶ Open 📄 View Source
🐘 ImageOccurrence.php
▶ Open 📄 View Source
🐘 InTotoProvenance.php
▶ Open 📄 View Source
🐘 InTotoSlsaProvenanceV1.php
▶ Open 📄 View Source
🐘 InTotoStatement.php
▶ Open 📄 View Source
🐘 Justification.php
▶ Open 📄 View Source
🐘 Jwt.php
▶ Open 📄 View Source
🐘 LanguagePackageDependency.php
▶ Open 📄 View Source
🐘 Layer.php
▶ Open 📄 View Source
🐘 LayerDetails.php
▶ Open 📄 View Source
🐘 License.php
▶ Open 📄 View Source
🐘 ListOperationsResponse.php
▶ Open 📄 View Source
🐘 ListVulnerabilitiesResponseV1.php
▶ Open 📄 View Source
🐘 Location.php
▶ Open 📄 View Source
🐘 Maintainer.php
▶ Open 📄 View Source
🐘 Material.php
▶ Open 📄 View Source
🐘 Metadata.php
▶ Open 📄 View Source
🐘 NonCompliantFile.php
▶ Open 📄 View Source
🐘 Occurrence.php
▶ Open 📄 View Source
🐘 OndemandscanningEmpty.php
▶ Open 📄 View Source
🐘 OndemandscanningFile.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 PackageData.php
▶ Open 📄 View Source
🐘 PackageIssue.php
▶ Open 📄 View Source
🐘 PackageOccurrence.php
▶ Open 📄 View Source
🐘 PackageVersion.php
▶ Open 📄 View Source
🐘 ProjectRepoId.php
▶ Open 📄 View Source
🐘 ProvenanceBuilder.php
▶ Open 📄 View Source
🐘 Recipe.php
▶ Open 📄 View Source
🐘 RelatedUrl.php
▶ Open 📄 View Source
🐘 Remediation.php
▶ Open 📄 View Source
🐘 RepoId.php
▶ Open 📄 View Source
🐘 ResourceDescriptor.php
▶ Open 📄 View Source
🐘 Risk.php
▶ Open 📄 View Source
🐘 RunDetails.php
▶ Open 📄 View Source
🐘 SBOMReferenceOccurrence.php
▶ Open 📄 View Source
🐘 SBOMStatus.php
▶ Open 📄 View Source
🐘 SbomReferenceIntotoPayload.php
▶ Open 📄 View Source
🐘 SbomReferenceIntotoPredicate.php
▶ Open 📄 View Source
🐘 SecretLocation.php
▶ Open 📄 View Source
🐘 SecretOccurrence.php
▶ Open 📄 View Source
🐘 SecretStatus.php
▶ Open 📄 View Source
🐘 Signature.php
▶ Open 📄 View Source
🐘 SlsaBuilder.php
▶ Open 📄 View Source
🐘 SlsaCompleteness.php
▶ Open 📄 View Source
🐘 SlsaMetadata.php
▶ Open 📄 View Source
🐘 SlsaProvenance.php
▶ Open 📄 View Source
🐘 SlsaProvenance02.php
▶ Open 📄 View Source
🐘 SlsaProvenanceV1.php
▶ Open 📄 View Source
🐘 SlsaProvenanceZeroTwo.php
▶ Open 📄 View Source
🐘 SlsaRecipe.php
▶ Open 📄 View Source
🐘 Source.php
▶ Open 📄 View Source
🐘 SourceContext.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 Subject.php
▶ Open 📄 View Source
🐘 UpgradeDistribution.php
▶ Open 📄 View Source
🐘 UpgradeOccurrence.php
▶ Open 📄 View Source
🐘 Version.php
▶ Open 📄 View Source
🐘 VexAssessment.php
▶ Open 📄 View Source
🐘 VulnerabilityAttestation.php
▶ Open 📄 View Source
🐘 VulnerabilityOccurrence.php
▶ Open 📄 View Source
🐘 WindowsUpdate.php
▶ Open 📄 View Source

📄 Source: PackageIssue.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\OnDemandScanning;

class PackageIssue extends \Google\Collection
{
  /**
   * Unknown.
   */
  public const EFFECTIVE_SEVERITY_SEVERITY_UNSPECIFIED = 'SEVERITY_UNSPECIFIED';
  /**
   * Minimal severity.
   */
  public const EFFECTIVE_SEVERITY_MINIMAL = 'MINIMAL';
  /**
   * Low severity.
   */
  public const EFFECTIVE_SEVERITY_LOW = 'LOW';
  /**
   * Medium severity.
   */
  public const EFFECTIVE_SEVERITY_MEDIUM = 'MEDIUM';
  /**
   * High severity.
   */
  public const EFFECTIVE_SEVERITY_HIGH = 'HIGH';
  /**
   * Critical severity.
   */
  public const EFFECTIVE_SEVERITY_CRITICAL = 'CRITICAL';
  protected $collection_key = 'fileLocation';
  /**
   * Required. The [CPE URI](https://cpe.mitre.org/specification/) this
   * vulnerability was found in.
   *
   * @var string
   */
  public $affectedCpeUri;
  /**
   * Required. The package this vulnerability was found in.
   *
   * @var string
   */
  public $affectedPackage;
  protected $affectedVersionType = Version::class;
  protected $affectedVersionDataType = '';
  /**
   * Output only. The distro or language system assigned severity for this
   * vulnerability when that is available and note provider assigned severity
   * when it is not available.
   *
   * @var string
   */
  public $effectiveSeverity;
  protected $fileLocationType = GrafeasV1FileLocation::class;
  protected $fileLocationDataType = 'array';
  /**
   * Output only. Whether a fix is available for this package.
   *
   * @var bool
   */
  public $fixAvailable;
  /**
   * The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was
   * fixed in. It is possible for this to be different from the
   * affected_cpe_uri.
   *
   * @var string
   */
  public $fixedCpeUri;
  /**
   * The package this vulnerability was fixed in. It is possible for this to be
   * different from the affected_package.
   *
   * @var string
   */
  public $fixedPackage;
  protected $fixedVersionType = Version::class;
  protected $fixedVersionDataType = '';
  /**
   * The type of package (e.g. OS, MAVEN, GO).
   *
   * @var string
   */
  public $packageType;

  /**
   * Required. The [CPE URI](https://cpe.mitre.org/specification/) this
   * vulnerability was found in.
   *
   * @param string $affectedCpeUri
   */
  public function setAffectedCpeUri($affectedCpeUri)
  {
    $this->affectedCpeUri = $affectedCpeUri;
  }
  /**
   * @return string
   */
  public function getAffectedCpeUri()
  {
    return $this->affectedCpeUri;
  }
  /**
   * Required. The package this vulnerability was found in.
   *
   * @param string $affectedPackage
   */
  public function setAffectedPackage($affectedPackage)
  {
    $this->affectedPackage = $affectedPackage;
  }
  /**
   * @return string
   */
  public function getAffectedPackage()
  {
    return $this->affectedPackage;
  }
  /**
   * Required. The version of the package that is installed on the resource
   * affected by this vulnerability.
   *
   * @param Version $affectedVersion
   */
  public function setAffectedVersion(Version $affectedVersion)
  {
    $this->affectedVersion = $affectedVersion;
  }
  /**
   * @return Version
   */
  public function getAffectedVersion()
  {
    return $this->affectedVersion;
  }
  /**
   * Output only. The distro or language system assigned severity for this
   * vulnerability when that is available and note provider assigned severity
   * when it is not available.
   *
   * Accepted values: SEVERITY_UNSPECIFIED, MINIMAL, LOW, MEDIUM, HIGH, CRITICAL
   *
   * @param self::EFFECTIVE_SEVERITY_* $effectiveSeverity
   */
  public function setEffectiveSeverity($effectiveSeverity)
  {
    $this->effectiveSeverity = $effectiveSeverity;
  }
  /**
   * @return self::EFFECTIVE_SEVERITY_*
   */
  public function getEffectiveSeverity()
  {
    return $this->effectiveSeverity;
  }
  /**
   * The location at which this package was found.
   *
   * @param GrafeasV1FileLocation[] $fileLocation
   */
  public function setFileLocation($fileLocation)
  {
    $this->fileLocation = $fileLocation;
  }
  /**
   * @return GrafeasV1FileLocation[]
   */
  public function getFileLocation()
  {
    return $this->fileLocation;
  }
  /**
   * Output only. Whether a fix is available for this package.
   *
   * @param bool $fixAvailable
   */
  public function setFixAvailable($fixAvailable)
  {
    $this->fixAvailable = $fixAvailable;
  }
  /**
   * @return bool
   */
  public function getFixAvailable()
  {
    return $this->fixAvailable;
  }
  /**
   * The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was
   * fixed in. It is possible for this to be different from the
   * affected_cpe_uri.
   *
   * @param string $fixedCpeUri
   */
  public function setFixedCpeUri($fixedCpeUri)
  {
    $this->fixedCpeUri = $fixedCpeUri;
  }
  /**
   * @return string
   */
  public function getFixedCpeUri()
  {
    return $this->fixedCpeUri;
  }
  /**
   * The package this vulnerability was fixed in. It is possible for this to be
   * different from the affected_package.
   *
   * @param string $fixedPackage
   */
  public function setFixedPackage($fixedPackage)
  {
    $this->fixedPackage = $fixedPackage;
  }
  /**
   * @return string
   */
  public function getFixedPackage()
  {
    return $this->fixedPackage;
  }
  /**
   * Required. The version of the package this vulnerability was fixed in.
   * Setting this to VersionKind.MAXIMUM means no fix is yet available.
   *
   * @param Version $fixedVersion
   */
  public function setFixedVersion(Version $fixedVersion)
  {
    $this->fixedVersion = $fixedVersion;
  }
  /**
   * @return Version
   */
  public function getFixedVersion()
  {
    return $this->fixedVersion;
  }
  /**
   * The type of package (e.g. OS, MAVEN, GO).
   *
   * @param string $packageType
   */
  public function setPackageType($packageType)
  {
    $this->packageType = $packageType;
  }
  /**
   * @return string
   */
  public function getPackageType()
  {
    return $this->packageType;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(PackageIssue::class, 'Google_Service_OnDemandScanning_PackageIssue');
← Back