📂 File Browser

AgentAI/vendor/google/apiclient-services/src/BinaryAuthorization
☀️ Light Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AdmissionRule.php
▶ Open 📄 View Source
🐘 AdmissionWhitelistPattern.php
▶ Open 📄 View Source
🐘 AllowlistResult.php
▶ Open 📄 View Source
🐘 AttestationAuthenticator.php
▶ Open 📄 View Source
🐘 AttestationOccurrence.php
▶ Open 📄 View Source
🐘 AttestationSource.php
▶ Open 📄 View Source
🐘 Attestor.php
▶ Open 📄 View Source
🐘 AttestorPublicKey.php
▶ Open 📄 View Source
🐘 BinaryauthorizationEmpty.php
▶ Open 📄 View Source
🐘 Binding.php
▶ Open 📄 View Source
🐘 Check.php
▶ Open 📄 View Source
🐘 CheckResult.php
▶ Open 📄 View Source
🐘 CheckResults.php
▶ Open 📄 View Source
🐘 CheckSet.php
▶ Open 📄 View Source
🐘 CheckSetResult.php
▶ Open 📄 View Source
🐘 EvaluateGkePolicyRequest.php
▶ Open 📄 View Source
🐘 EvaluateGkePolicyResponse.php
▶ Open 📄 View Source
🐘 EvaluationResult.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 GkePolicy.php
▶ Open 📄 View Source
🐘 IamPolicy.php
▶ Open 📄 View Source
🐘 ImageAllowlist.php
▶ Open 📄 View Source
🐘 ImageFreshnessCheck.php
▶ Open 📄 View Source
🐘 ImageResult.php
▶ Open 📄 View Source
🐘 Jwt.php
▶ Open 📄 View Source
🐘 ListAttestorsResponse.php
▶ Open 📄 View Source
🐘 ListPlatformPoliciesResponse.php
▶ Open 📄 View Source
🐘 PkixPublicKey.php
▶ Open 📄 View Source
🐘 PkixPublicKeySet.php
▶ Open 📄 View Source
🐘 PlatformPolicy.php
▶ Open 📄 View Source
🐘 PodResult.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 Scope.php
▶ Open 📄 View Source
🐘 SetIamPolicyRequest.php
▶ Open 📄 View Source
🐘 Signature.php
▶ Open 📄 View Source
🐘 SigstoreAuthority.php
▶ Open 📄 View Source
🐘 SigstorePublicKey.php
▶ Open 📄 View Source
🐘 SigstorePublicKeySet.php
▶ Open 📄 View Source
🐘 SigstoreSignatureCheck.php
▶ Open 📄 View Source
🐘 SimpleSigningAttestationCheck.php
▶ Open 📄 View Source
🐘 SlsaCheck.php
▶ Open 📄 View Source
🐘 TestIamPermissionsRequest.php
▶ Open 📄 View Source
🐘 TestIamPermissionsResponse.php
▶ Open 📄 View Source
🐘 TrustedDirectoryCheck.php
▶ Open 📄 View Source
🐘 UserOwnedGrafeasNote.php
▶ Open 📄 View Source
🐘 ValidateAttestationOccurrenceRequest.php
▶ Open 📄 View Source
🐘 ValidateAttestationOccurrenceResponse.php
▶ Open 📄 View Source
🐘 VerificationRule.php
▶ Open 📄 View Source
🐘 VulnerabilityCheck.php
▶ Open 📄 View Source

📄 Source: Signature.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\BinaryAuthorization;

class Signature extends \Google\Model
{
  /**
   * The identifier for the public key that verifies this signature. * The
   * `public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986
   * conformant URI. * When possible, the `public_key_id` SHOULD be an immutable
   * reference, such as a cryptographic digest. Examples of valid
   * `public_key_id`s: OpenPGP V4 public key fingerprint: *
   * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See
   * https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
   * details on this scheme. RFC6920 digest-named SubjectPublicKeyInfo (digest
   * of the DER serialization): *
   * "ni:sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU" * "nih:sha-
   * 256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
   *
   * @var string
   */
  public $publicKeyId;
  /**
   * The content of the signature, an opaque bytestring. The payload that this
   * signature verifies MUST be unambiguously provided with the Signature during
   * verification. A wrapper message might provide the payload explicitly.
   * Alternatively, a message might have a canonical serialization that can
   * always be unambiguously computed to derive the payload.
   *
   * @var string
   */
  public $signature;

  /**
   * The identifier for the public key that verifies this signature. * The
   * `public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986
   * conformant URI. * When possible, the `public_key_id` SHOULD be an immutable
   * reference, such as a cryptographic digest. Examples of valid
   * `public_key_id`s: OpenPGP V4 public key fingerprint: *
   * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See
   * https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
   * details on this scheme. RFC6920 digest-named SubjectPublicKeyInfo (digest
   * of the DER serialization): *
   * "ni:sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU" * "nih:sha-
   * 256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
   *
   * @param string $publicKeyId
   */
  public function setPublicKeyId($publicKeyId)
  {
    $this->publicKeyId = $publicKeyId;
  }
  /**
   * @return string
   */
  public function getPublicKeyId()
  {
    return $this->publicKeyId;
  }
  /**
   * The content of the signature, an opaque bytestring. The payload that this
   * signature verifies MUST be unambiguously provided with the Signature during
   * verification. A wrapper message might provide the payload explicitly.
   * Alternatively, a message might have a canonical serialization that can
   * always be unambiguously computed to derive the payload.
   *
   * @param string $signature
   */
  public function setSignature($signature)
  {
    $this->signature = $signature;
  }
  /**
   * @return string
   */
  public function getSignature()
  {
    return $this->signature;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(Signature::class, 'Google_Service_BinaryAuthorization_Signature');
← Back