📂 File Browser

AgentAI/vendor/google/apiclient-services/src/OnDemandScanning
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AISkillAnalysisOccurrence.php
▶ Open 📄 View Source
🐘 AliasContext.php
▶ Open 📄 View Source
🐘 AnalysisCompleted.php
▶ Open 📄 View Source
🐘 AnalyzePackagesMetadata.php
▶ Open 📄 View Source
🐘 AnalyzePackagesMetadataV1.php
▶ Open 📄 View Source
🐘 AnalyzePackagesRequestV1.php
▶ Open 📄 View Source
🐘 AnalyzePackagesResponse.php
▶ Open 📄 View Source
🐘 AnalyzePackagesResponseV1.php
▶ Open 📄 View Source
🐘 Artifact.php
▶ Open 📄 View Source
🐘 AttestationOccurrence.php
▶ Open 📄 View Source
🐘 BaseImage.php
▶ Open 📄 View Source
🐘 Binary.php
▶ Open 📄 View Source
🐘 BinarySourceInfo.php
▶ Open 📄 View Source
🐘 BuildDefinition.php
▶ Open 📄 View Source
🐘 BuildMetadata.php
▶ Open 📄 View Source
🐘 BuildOccurrence.php
▶ Open 📄 View Source
🐘 BuildProvenance.php
▶ Open 📄 View Source
🐘 BuilderConfig.php
▶ Open 📄 View Source
🐘 CISAKnownExploitedVulnerabilities.php
▶ Open 📄 View Source
🐘 CVSS.php
▶ Open 📄 View Source
🐘 Category.php
▶ Open 📄 View Source
🐘 CloudRepoSourceContext.php
▶ Open 📄 View Source
🐘 Command.php
▶ Open 📄 View Source
🐘 Completeness.php
▶ Open 📄 View Source
🐘 ComplianceOccurrence.php
▶ Open 📄 View Source
🐘 ComplianceVersion.php
▶ Open 📄 View Source
🐘 DSSEAttestationOccurrence.php
▶ Open 📄 View Source
🐘 DeploymentOccurrence.php
▶ Open 📄 View Source
🐘 DiscoveryOccurrence.php
▶ Open 📄 View Source
🐘 Envelope.php
▶ Open 📄 View Source
🐘 EnvelopeSignature.php
▶ Open 📄 View Source
🐘 ExploitPredictionScoringSystem.php
▶ Open 📄 View Source
🐘 FileHashes.php
▶ Open 📄 View Source
🐘 FileLocation.php
▶ Open 📄 View Source
🐘 Finding.php
▶ Open 📄 View Source
🐘 Fingerprint.php
▶ Open 📄 View Source
🐘 GerritSourceContext.php
▶ Open 📄 View Source
🐘 GitSourceContext.php
▶ Open 📄 View Source
🐘 GrafeasV1BaseImage.php
▶ Open 📄 View Source
🐘 GrafeasV1FileLocation.php
▶ Open 📄 View Source
🐘 GrafeasV1LayerDetails.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaBuilder.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaCompleteness.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaConfigSource.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaInvocation.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaMaterial.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenance02SlsaMetadata.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaBuilder.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaCompleteness.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaConfigSource.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaInvocation.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaMaterial.php
▶ Open 📄 View Source
🐘 GrafeasV1SlsaProvenanceZeroTwoSlsaMetadata.php
▶ Open 📄 View Source
🐘 Hash.php
▶ Open 📄 View Source
🐘 Identity.php
▶ Open 📄 View Source
🐘 ImageOccurrence.php
▶ Open 📄 View Source
🐘 InTotoProvenance.php
▶ Open 📄 View Source
🐘 InTotoSlsaProvenanceV1.php
▶ Open 📄 View Source
🐘 InTotoStatement.php
▶ Open 📄 View Source
🐘 Justification.php
▶ Open 📄 View Source
🐘 Jwt.php
▶ Open 📄 View Source
🐘 LanguagePackageDependency.php
▶ Open 📄 View Source
🐘 Layer.php
▶ Open 📄 View Source
🐘 LayerDetails.php
▶ Open 📄 View Source
🐘 License.php
▶ Open 📄 View Source
🐘 ListOperationsResponse.php
▶ Open 📄 View Source
🐘 ListVulnerabilitiesResponseV1.php
▶ Open 📄 View Source
🐘 Location.php
▶ Open 📄 View Source
🐘 Maintainer.php
▶ Open 📄 View Source
🐘 Material.php
▶ Open 📄 View Source
🐘 Metadata.php
▶ Open 📄 View Source
🐘 NonCompliantFile.php
▶ Open 📄 View Source
🐘 Occurrence.php
▶ Open 📄 View Source
🐘 OndemandscanningEmpty.php
▶ Open 📄 View Source
🐘 OndemandscanningFile.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 PackageData.php
▶ Open 📄 View Source
🐘 PackageIssue.php
▶ Open 📄 View Source
🐘 PackageOccurrence.php
▶ Open 📄 View Source
🐘 PackageVersion.php
▶ Open 📄 View Source
🐘 ProjectRepoId.php
▶ Open 📄 View Source
🐘 ProvenanceBuilder.php
▶ Open 📄 View Source
🐘 Recipe.php
▶ Open 📄 View Source
🐘 RelatedUrl.php
▶ Open 📄 View Source
🐘 Remediation.php
▶ Open 📄 View Source
🐘 RepoId.php
▶ Open 📄 View Source
🐘 ResourceDescriptor.php
▶ Open 📄 View Source
🐘 Risk.php
▶ Open 📄 View Source
🐘 RunDetails.php
▶ Open 📄 View Source
🐘 SBOMReferenceOccurrence.php
▶ Open 📄 View Source
🐘 SBOMStatus.php
▶ Open 📄 View Source
🐘 SbomReferenceIntotoPayload.php
▶ Open 📄 View Source
🐘 SbomReferenceIntotoPredicate.php
▶ Open 📄 View Source
🐘 SecretLocation.php
▶ Open 📄 View Source
🐘 SecretOccurrence.php
▶ Open 📄 View Source
🐘 SecretStatus.php
▶ Open 📄 View Source
🐘 Signature.php
▶ Open 📄 View Source
🐘 SlsaBuilder.php
▶ Open 📄 View Source
🐘 SlsaCompleteness.php
▶ Open 📄 View Source
🐘 SlsaMetadata.php
▶ Open 📄 View Source
🐘 SlsaProvenance.php
▶ Open 📄 View Source
🐘 SlsaProvenance02.php
▶ Open 📄 View Source
🐘 SlsaProvenanceV1.php
▶ Open 📄 View Source
🐘 SlsaProvenanceZeroTwo.php
▶ Open 📄 View Source
🐘 SlsaRecipe.php
▶ Open 📄 View Source
🐘 Source.php
▶ Open 📄 View Source
🐘 SourceContext.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 Subject.php
▶ Open 📄 View Source
🐘 UpgradeDistribution.php
▶ Open 📄 View Source
🐘 UpgradeOccurrence.php
▶ Open 📄 View Source
🐘 Version.php
▶ Open 📄 View Source
🐘 VexAssessment.php
▶ Open 📄 View Source
🐘 VulnerabilityAttestation.php
▶ Open 📄 View Source
🐘 VulnerabilityOccurrence.php
▶ Open 📄 View Source
🐘 WindowsUpdate.php
▶ Open 📄 View Source

📄 Source: VexAssessment.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\OnDemandScanning;

class VexAssessment extends \Google\Collection
{
  /**
   * No state is specified.
   */
  public const STATE_STATE_UNSPECIFIED = 'STATE_UNSPECIFIED';
  /**
   * This product is known to be affected by this vulnerability.
   */
  public const STATE_AFFECTED = 'AFFECTED';
  /**
   * This product is known to be not affected by this vulnerability.
   */
  public const STATE_NOT_AFFECTED = 'NOT_AFFECTED';
  /**
   * This product contains a fix for this vulnerability.
   */
  public const STATE_FIXED = 'FIXED';
  /**
   * It is not known yet whether these versions are or are not affected by the
   * vulnerability. However, it is still under investigation.
   */
  public const STATE_UNDER_INVESTIGATION = 'UNDER_INVESTIGATION';
  protected $collection_key = 'remediations';
  /**
   * Holds the MITRE standard Common Vulnerabilities and Exposures (CVE)
   * tracking number for the vulnerability. Deprecated: Use vulnerability_id
   * instead to denote CVEs.
   *
   * @deprecated
   * @var string
   */
  public $cve;
  /**
   * Contains information about the impact of this vulnerability, this will
   * change with time.
   *
   * @var string[]
   */
  public $impacts;
  protected $justificationType = Justification::class;
  protected $justificationDataType = '';
  /**
   * The VulnerabilityAssessment note from which this VexAssessment was
   * generated. This will be of the form:
   * `projects/[PROJECT_ID]/notes/[NOTE_ID]`.
   *
   * @var string
   */
  public $noteName;
  protected $relatedUrisType = RelatedUrl::class;
  protected $relatedUrisDataType = 'array';
  protected $remediationsType = Remediation::class;
  protected $remediationsDataType = 'array';
  /**
   * Provides the state of this Vulnerability assessment.
   *
   * @var string
   */
  public $state;
  /**
   * The vulnerability identifier for this Assessment. Will hold one of common
   * identifiers e.g. CVE, GHSA etc.
   *
   * @var string
   */
  public $vulnerabilityId;

  /**
   * Holds the MITRE standard Common Vulnerabilities and Exposures (CVE)
   * tracking number for the vulnerability. Deprecated: Use vulnerability_id
   * instead to denote CVEs.
   *
   * @deprecated
   * @param string $cve
   */
  public function setCve($cve)
  {
    $this->cve = $cve;
  }
  /**
   * @deprecated
   * @return string
   */
  public function getCve()
  {
    return $this->cve;
  }
  /**
   * Contains information about the impact of this vulnerability, this will
   * change with time.
   *
   * @param string[] $impacts
   */
  public function setImpacts($impacts)
  {
    $this->impacts = $impacts;
  }
  /**
   * @return string[]
   */
  public function getImpacts()
  {
    return $this->impacts;
  }
  /**
   * Justification provides the justification when the state of the assessment
   * if NOT_AFFECTED.
   *
   * @param Justification $justification
   */
  public function setJustification(Justification $justification)
  {
    $this->justification = $justification;
  }
  /**
   * @return Justification
   */
  public function getJustification()
  {
    return $this->justification;
  }
  /**
   * The VulnerabilityAssessment note from which this VexAssessment was
   * generated. This will be of the form:
   * `projects/[PROJECT_ID]/notes/[NOTE_ID]`.
   *
   * @param string $noteName
   */
  public function setNoteName($noteName)
  {
    $this->noteName = $noteName;
  }
  /**
   * @return string
   */
  public function getNoteName()
  {
    return $this->noteName;
  }
  /**
   * Holds a list of references associated with this vulnerability item and
   * assessment.
   *
   * @param RelatedUrl[] $relatedUris
   */
  public function setRelatedUris($relatedUris)
  {
    $this->relatedUris = $relatedUris;
  }
  /**
   * @return RelatedUrl[]
   */
  public function getRelatedUris()
  {
    return $this->relatedUris;
  }
  /**
   * Specifies details on how to handle (and presumably, fix) a vulnerability.
   *
   * @param Remediation[] $remediations
   */
  public function setRemediations($remediations)
  {
    $this->remediations = $remediations;
  }
  /**
   * @return Remediation[]
   */
  public function getRemediations()
  {
    return $this->remediations;
  }
  /**
   * Provides the state of this Vulnerability assessment.
   *
   * Accepted values: STATE_UNSPECIFIED, AFFECTED, NOT_AFFECTED, FIXED,
   * UNDER_INVESTIGATION
   *
   * @param self::STATE_* $state
   */
  public function setState($state)
  {
    $this->state = $state;
  }
  /**
   * @return self::STATE_*
   */
  public function getState()
  {
    return $this->state;
  }
  /**
   * The vulnerability identifier for this Assessment. Will hold one of common
   * identifiers e.g. CVE, GHSA etc.
   *
   * @param string $vulnerabilityId
   */
  public function setVulnerabilityId($vulnerabilityId)
  {
    $this->vulnerabilityId = $vulnerabilityId;
  }
  /**
   * @return string
   */
  public function getVulnerabilityId()
  {
    return $this->vulnerabilityId;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(VexAssessment::class, 'Google_Service_OnDemandScanning_VexAssessment');
← Back