emass_client 1.0.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (132) hide show
  1. checksums.yaml +7 -0
  2. data/README.md +1284 -0
  3. data/Rakefile +8 -0
  4. data/lib/emass_client/api/artifacts_api.rb +310 -0
  5. data/lib/emass_client/api/artifacts_export_api.rb +86 -0
  6. data/lib/emass_client/api/cac_api.rb +143 -0
  7. data/lib/emass_client/api/cmmc_assessments_api.rb +77 -0
  8. data/lib/emass_client/api/controls_api.rb +143 -0
  9. data/lib/emass_client/api/milestones_api.rb +366 -0
  10. data/lib/emass_client/api/pac_api.rb +140 -0
  11. data/lib/emass_client/api/poam_api.rb +345 -0
  12. data/lib/emass_client/api/registration_api.rb +78 -0
  13. data/lib/emass_client/api/static_code_scans_api.rb +84 -0
  14. data/lib/emass_client/api/system_roles_api.rb +150 -0
  15. data/lib/emass_client/api/systems_api.rb +162 -0
  16. data/lib/emass_client/api/test_api.rb +70 -0
  17. data/lib/emass_client/api/test_results_api.rb +149 -0
  18. data/lib/emass_client/api/workflow_definitions_api.rb +76 -0
  19. data/lib/emass_client/api/workflow_instances_api.rb +153 -0
  20. data/lib/emass_client/api_client.rb +389 -0
  21. data/lib/emass_client/api_error.rb +57 -0
  22. data/lib/emass_client/configuration.rb +224 -0
  23. data/lib/emass_client/models/artifacts_delete.rb +201 -0
  24. data/lib/emass_client/models/artifacts_delete_inner.rb +207 -0
  25. data/lib/emass_client/models/artifacts_get.rb +383 -0
  26. data/lib/emass_client/models/artifacts_request_put_body.rb +363 -0
  27. data/lib/emass_client/models/artifacts_response_del.rb +217 -0
  28. data/lib/emass_client/models/artifacts_response_del_data.rb +225 -0
  29. data/lib/emass_client/models/artifacts_response_get.rb +217 -0
  30. data/lib/emass_client/models/artifacts_response_put_post.rb +217 -0
  31. data/lib/emass_client/models/cac_get.rb +301 -0
  32. data/lib/emass_client/models/cac_request_post_body.rb +217 -0
  33. data/lib/emass_client/models/cac_response_get.rb +217 -0
  34. data/lib/emass_client/models/cac_response_post.rb +217 -0
  35. data/lib/emass_client/models/cac_response_post_data.rb +225 -0
  36. data/lib/emass_client/models/cmmc_get.rb +398 -0
  37. data/lib/emass_client/models/cmmc_response_get.rb +217 -0
  38. data/lib/emass_client/models/connectivity_ccsd.rb +217 -0
  39. data/lib/emass_client/models/controls_get.rb +663 -0
  40. data/lib/emass_client/models/controls_put.rb +227 -0
  41. data/lib/emass_client/models/controls_request_put_body.rb +606 -0
  42. data/lib/emass_client/models/controls_response_get.rb +217 -0
  43. data/lib/emass_client/models/controls_response_put.rb +217 -0
  44. data/lib/emass_client/models/definition_transitions.rb +274 -0
  45. data/lib/emass_client/models/delete_milestone.rb +212 -0
  46. data/lib/emass_client/models/delete_poam.rb +212 -0
  47. data/lib/emass_client/models/empty200_response.rb +197 -0
  48. data/lib/emass_client/models/error.rb +225 -0
  49. data/lib/emass_client/models/instances_transitions.rb +327 -0
  50. data/lib/emass_client/models/milestone_response_get.rb +217 -0
  51. data/lib/emass_client/models/milestone_response_post.rb +217 -0
  52. data/lib/emass_client/models/milestone_response_put.rb +217 -0
  53. data/lib/emass_client/models/milestones_delete.rb +197 -0
  54. data/lib/emass_client/models/milestones_get.rb +291 -0
  55. data/lib/emass_client/models/milestones_post.rb +197 -0
  56. data/lib/emass_client/models/milestones_put.rb +197 -0
  57. data/lib/emass_client/models/milestones_put_post_delete.rb +247 -0
  58. data/lib/emass_client/models/milestones_request_post_body.rb +242 -0
  59. data/lib/emass_client/models/milestones_request_put_body.rb +242 -0
  60. data/lib/emass_client/models/milestones_required_post.rb +227 -0
  61. data/lib/emass_client/models/milestones_required_put.rb +242 -0
  62. data/lib/emass_client/models/model_200.rb +208 -0
  63. data/lib/emass_client/models/model_201.rb +206 -0
  64. data/lib/emass_client/models/model_201_meta.rb +219 -0
  65. data/lib/emass_client/models/model_400.rb +206 -0
  66. data/lib/emass_client/models/model_400_meta.rb +219 -0
  67. data/lib/emass_client/models/model_400_response.rb +206 -0
  68. data/lib/emass_client/models/model_401.rb +206 -0
  69. data/lib/emass_client/models/model_401_meta.rb +219 -0
  70. data/lib/emass_client/models/model_403.rb +206 -0
  71. data/lib/emass_client/models/model_403_meta.rb +219 -0
  72. data/lib/emass_client/models/model_404.rb +219 -0
  73. data/lib/emass_client/models/model_404_response.rb +206 -0
  74. data/lib/emass_client/models/model_405.rb +206 -0
  75. data/lib/emass_client/models/model_405_meta.rb +219 -0
  76. data/lib/emass_client/models/model_411.rb +206 -0
  77. data/lib/emass_client/models/model_411_meta.rb +219 -0
  78. data/lib/emass_client/models/model_490.rb +206 -0
  79. data/lib/emass_client/models/model_490_meta.rb +219 -0
  80. data/lib/emass_client/models/model_500.rb +206 -0
  81. data/lib/emass_client/models/model_500_meta.rb +219 -0
  82. data/lib/emass_client/models/pac_get.rb +311 -0
  83. data/lib/emass_client/models/pac_post.rb +259 -0
  84. data/lib/emass_client/models/pac_request_post_body.rb +261 -0
  85. data/lib/emass_client/models/pac_response_get.rb +217 -0
  86. data/lib/emass_client/models/pac_response_post.rb +217 -0
  87. data/lib/emass_client/models/poam_delete.rb +197 -0
  88. data/lib/emass_client/models/poam_get.rb +646 -0
  89. data/lib/emass_client/models/poam_post.rb +197 -0
  90. data/lib/emass_client/models/poam_post_put_del.rb +237 -0
  91. data/lib/emass_client/models/poam_put.rb +197 -0
  92. data/lib/emass_client/models/poam_request_post_body.rb +197 -0
  93. data/lib/emass_client/models/poam_request_put_body.rb +197 -0
  94. data/lib/emass_client/models/poam_required_post.rb +564 -0
  95. data/lib/emass_client/models/poam_required_put.rb +594 -0
  96. data/lib/emass_client/models/poam_response_delete.rb +217 -0
  97. data/lib/emass_client/models/poam_response_get.rb +217 -0
  98. data/lib/emass_client/models/poam_response_post.rb +217 -0
  99. data/lib/emass_client/models/poam_response_put.rb +217 -0
  100. data/lib/emass_client/models/register.rb +215 -0
  101. data/lib/emass_client/models/register_data.rb +206 -0
  102. data/lib/emass_client/models/register_user_request_post_body.rb +211 -0
  103. data/lib/emass_client/models/role_category.rb +272 -0
  104. data/lib/emass_client/models/roles.rb +274 -0
  105. data/lib/emass_client/models/ssps.rb +227 -0
  106. data/lib/emass_client/models/stage.rb +252 -0
  107. data/lib/emass_client/models/static_code_application.rb +303 -0
  108. data/lib/emass_client/models/static_code_request_post_body.rb +197 -0
  109. data/lib/emass_client/models/static_code_required_post.rb +217 -0
  110. data/lib/emass_client/models/static_code_required_post_application.rb +217 -0
  111. data/lib/emass_client/models/success200_response.rb +217 -0
  112. data/lib/emass_client/models/system_id_artifacts_body.rb +284 -0
  113. data/lib/emass_client/models/system_response.rb +217 -0
  114. data/lib/emass_client/models/system_roles_category_response.rb +217 -0
  115. data/lib/emass_client/models/system_roles_response.rb +217 -0
  116. data/lib/emass_client/models/system_roles_response_data.rb +219 -0
  117. data/lib/emass_client/models/systems.rb +1137 -0
  118. data/lib/emass_client/models/test.rb +215 -0
  119. data/lib/emass_client/models/test_data.rb +206 -0
  120. data/lib/emass_client/models/test_results_get.rb +333 -0
  121. data/lib/emass_client/models/test_results_post.rb +227 -0
  122. data/lib/emass_client/models/test_results_request_post_body.rb +306 -0
  123. data/lib/emass_client/models/test_results_response_get.rb +217 -0
  124. data/lib/emass_client/models/test_results_response_post.rb +217 -0
  125. data/lib/emass_client/models/users.rb +224 -0
  126. data/lib/emass_client/models/workflow_definition_get.rb +282 -0
  127. data/lib/emass_client/models/workflow_definition_response_get.rb +217 -0
  128. data/lib/emass_client/models/workflow_instances_get.rb +368 -0
  129. data/lib/emass_client/models/workflow_instances_response_get.rb +217 -0
  130. data/lib/emass_client/version.rb +14 -0
  131. data/lib/emass_client.rb +161 -0
  132. metadata +259 -0
@@ -0,0 +1,646 @@
1
+ =begin
2
+ #Enterprise Mission Assurance Support Service (eMASS)
3
+
4
+ #The Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) Application Programming Interface (API) enables users to perform assessments and complete actions associated with system records. The `emasser` is a command-line interface (CLI) tool that implements all of the eMASS endpoints defined in the eMASS REST API v3.2, dated October 21, 2021.</br><br> <strong>Register CLI</strong></br> New users will need to register an API key with the eMASS development team prior to accessing the site for the first time. The eMASS REST API requires a client certificate (SSL/TLS, DoD PKI only) where {url}/api/register (POST) is used to register the client certificate.</br></br> Every call to the eMASS REST API will require the use of the agreed upon public key certificate and API key. The API key must be provided in the request header for all endpoint calls (api-key). If the service receives an untrusted certificate or API key, a 401 error response code will be returned along with an error message.</br></br> <strong>Available Request Headers:</strong></br> <table> <tr> <th align=left>key</th> <th align=left>Example Value</th> <th align=left>Description</th> </tr> <tr> <td>`api-key`</td> <td>api-key-provided-by-emass</td> <td>This API key must be provided in the request header for all endpoint calls</td> </tr> <tr> <td>`user-uid`</td> <td>USER.UID.KEY</td> <td>This User unique identifier key must be provided in the request header for all PUT, POST, and DELETE endpoint calls</td> </tr> <tr> <td></td><td></td> <td> Note: For DoD users this is the DoD ID Number (EIDIPI) on their DoD CAC </td> </tr> </table> </br><strong>Approve API Client for Actionable Requests</strong></br> Users are required to log-in to eMASS and grant permissions for a client to update data within eMASS on their behalf. This is only required for actionable requests (PUT, POST, DELETE). The Registration Endpoint and all GET requests can be accessed without completing this process with the correct permissions. Please note that leaving a field parameter blank (for PUT/POST requests) has the potential to clear information in the active eMASS records. To establish an account with eMASS and/or acquire an api-key/user-uid, contact one of the listed POC:
5
+
6
+ OpenAPI spec version: v3.2
7
+ Contact: disa.meade.id.mbx.emass-tier-iii-support@mail.mil
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 3.0.26
10
+ =end
11
+
12
+ require 'date'
13
+
14
+ module EmassClient
15
+ class PoamGet
16
+ # [Required] Unique eMASS system identifier.
17
+ attr_accessor :system_id
18
+
19
+ # [Required] Unique item identifier
20
+ attr_accessor :poam_id
21
+
22
+ # [Required] Globally unique identifier for individual POA&M Items, seen on the front-end as “ID”.
23
+ attr_accessor :display_poam_id
24
+
25
+ # [Read-only] Indicates whether a test result is inherited.
26
+ attr_accessor :is_inherited
27
+
28
+ # [Optional] Unique identifier external to the eMASS application for use with associating POA&Ms. 100 Characters.
29
+ attr_accessor :external_uid
30
+
31
+ # [Optional] System acronym name.
32
+ attr_accessor :control_acronyms
33
+
34
+ # [Optional] CCI associated with POA&M Item..
35
+ attr_accessor :cci
36
+
37
+ # [Required] Values include the following: (Ongoing,Risk Accepted,Completed,Not Applicable
38
+ attr_accessor :status
39
+
40
+ # [Read-Only] Values include the following options: (Not Approved,Under Review,Approved)
41
+ attr_accessor :review_status
42
+
43
+ # [Required] Provide a description of the POA&M Item. 2000 Characters.
44
+ attr_accessor :vulnerability_description
45
+
46
+ # [Required] Include Source Identifying Vulnerability text. 2000 Characters.
47
+ attr_accessor :source_ident_vuln
48
+
49
+ # [Optional] Security Checks that are associated with the POA&M.
50
+ attr_accessor :security_checks
51
+
52
+ attr_accessor :milestones
53
+
54
+ # [Required] Organization/Office represented. 100 Characters.
55
+ attr_accessor :poc_organization
56
+
57
+ # [Conditional] First name of POC. 100 Characters.
58
+ attr_accessor :poc_first_name
59
+
60
+ # [Conditional] Last name of POC. 100 Characters.
61
+ attr_accessor :poc_last_name
62
+
63
+ # [Conditional] Email address of POC. 100 Characters.
64
+ attr_accessor :poc_email
65
+
66
+ # [Conditional] Phone number of POC (area code) ***-**** format. 100 Characters.
67
+ attr_accessor :poc_phone_number
68
+
69
+ # [Conditional] Required for approved items. Values include the following options (Very Low,Low,Moderate,High,Very High)
70
+ attr_accessor :severity
71
+
72
+ # [Optional] Values include the following options (I,II,III)
73
+ attr_accessor :raw_severity
74
+
75
+ # [Optional] Values include the following options: (Very Low,Low,Moderate,High,Very High)
76
+ attr_accessor :relevance_of_threat
77
+
78
+ # [Optional] Values include the following options: (Very Low,Low,Moderate,High,Very High)
79
+ attr_accessor :likelihood
80
+
81
+ # [Optional] Values include the following options: (Very Low,Low,Moderate,High,Very High)
82
+ attr_accessor :impact
83
+
84
+ # [Optional] Include description of Security Control’s impact.
85
+ attr_accessor :impact_description
86
+
87
+ # [Optional] Values include the following options: (Very Low,Low,Moderate,High,Very High)
88
+ attr_accessor :residual_risk_level
89
+
90
+ # [Optional] Include recommendations. Character Limit = 2,000.
91
+ attr_accessor :recommendations
92
+
93
+ # [Required] List of resources used. 250 Characters.
94
+ attr_accessor :resources
95
+
96
+ # [Conditional] Required for ongoing and completed POA&M items. Unix time format.
97
+ attr_accessor :scheduled_completion_date
98
+
99
+ # [Conditional] Field is required for completed POA&M items. Unix time format.
100
+ attr_accessor :completion_date
101
+
102
+ # [Read-Only] Value returned for a POA&M Item with review status Approved” and has a milestone with a scheduled completion date that extends beyond the POA&M Item’s scheduled completion date.
103
+ attr_accessor :extension_date
104
+
105
+ # [Conditional] Field is required for completed and risk accepted POA&M items. 2000 Characters
106
+ attr_accessor :comments
107
+
108
+ # [Optional] Include mitigation explanation. 2000 Characters.
109
+ attr_accessor :mitigation
110
+
111
+ # [Conditional] Optionally used in PUT to delete milestones when updating a POA&M.
112
+ attr_accessor :is_active
113
+
114
+ class EnumAttributeValidator
115
+ attr_reader :datatype
116
+ attr_reader :allowable_values
117
+
118
+ def initialize(datatype, allowable_values)
119
+ @allowable_values = allowable_values.map do |value|
120
+ case datatype.to_s
121
+ when /Integer/i
122
+ value.to_i
123
+ when /Float/i
124
+ value.to_f
125
+ else
126
+ value
127
+ end
128
+ end
129
+ end
130
+
131
+ def valid?(value)
132
+ !value || allowable_values.include?(value)
133
+ end
134
+ end
135
+
136
+ # Attribute mapping from ruby-style variable name to JSON key.
137
+ def self.attribute_map
138
+ {
139
+ :'system_id' => :'systemId',
140
+ :'poam_id' => :'poamId',
141
+ :'display_poam_id' => :'displayPoamId',
142
+ :'is_inherited' => :'isInherited',
143
+ :'external_uid' => :'externalUid',
144
+ :'control_acronyms' => :'controlAcronyms',
145
+ :'cci' => :'cci',
146
+ :'status' => :'status',
147
+ :'review_status' => :'reviewStatus',
148
+ :'vulnerability_description' => :'vulnerabilityDescription',
149
+ :'source_ident_vuln' => :'sourceIdentVuln',
150
+ :'security_checks' => :'securityChecks',
151
+ :'milestones' => :'milestones',
152
+ :'poc_organization' => :'pocOrganization',
153
+ :'poc_first_name' => :'pocFirstName',
154
+ :'poc_last_name' => :'pocLastName',
155
+ :'poc_email' => :'pocEmail',
156
+ :'poc_phone_number' => :'pocPhoneNumber',
157
+ :'severity' => :'severity',
158
+ :'raw_severity' => :'rawSeverity',
159
+ :'relevance_of_threat' => :'relevanceOfThreat',
160
+ :'likelihood' => :'likelihood',
161
+ :'impact' => :'impact',
162
+ :'impact_description' => :'impactDescription',
163
+ :'residual_risk_level' => :'residualRiskLevel',
164
+ :'recommendations' => :'recommendations',
165
+ :'resources' => :'resources',
166
+ :'scheduled_completion_date' => :'scheduledCompletionDate',
167
+ :'completion_date' => :'completionDate',
168
+ :'extension_date' => :'extensionDate',
169
+ :'comments' => :'comments',
170
+ :'mitigation' => :'mitigation',
171
+ :'is_active' => :'isActive'
172
+ }
173
+ end
174
+
175
+ # Attribute type mapping.
176
+ def self.openapi_types
177
+ {
178
+ :'system_id' => :'Object',
179
+ :'poam_id' => :'Object',
180
+ :'display_poam_id' => :'Object',
181
+ :'is_inherited' => :'Object',
182
+ :'external_uid' => :'Object',
183
+ :'control_acronyms' => :'Object',
184
+ :'cci' => :'Object',
185
+ :'status' => :'Object',
186
+ :'review_status' => :'Object',
187
+ :'vulnerability_description' => :'Object',
188
+ :'source_ident_vuln' => :'Object',
189
+ :'security_checks' => :'Object',
190
+ :'milestones' => :'Object',
191
+ :'poc_organization' => :'Object',
192
+ :'poc_first_name' => :'Object',
193
+ :'poc_last_name' => :'Object',
194
+ :'poc_email' => :'Object',
195
+ :'poc_phone_number' => :'Object',
196
+ :'severity' => :'Object',
197
+ :'raw_severity' => :'Object',
198
+ :'relevance_of_threat' => :'Object',
199
+ :'likelihood' => :'Object',
200
+ :'impact' => :'Object',
201
+ :'impact_description' => :'Object',
202
+ :'residual_risk_level' => :'Object',
203
+ :'recommendations' => :'Object',
204
+ :'resources' => :'Object',
205
+ :'scheduled_completion_date' => :'Object',
206
+ :'completion_date' => :'Object',
207
+ :'extension_date' => :'Object',
208
+ :'comments' => :'Object',
209
+ :'mitigation' => :'Object',
210
+ :'is_active' => :'Object'
211
+ }
212
+ end
213
+
214
+ # List of attributes with nullable: true
215
+ def self.openapi_nullable
216
+ Set.new([
217
+ ])
218
+ end
219
+
220
+ # Initializes the object
221
+ # @param [Hash] attributes Model attributes in the form of hash
222
+ def initialize(attributes = {})
223
+ if (!attributes.is_a?(Hash))
224
+ fail ArgumentError, "The input argument (attributes) must be a hash in `EmassClient::PoamGet` initialize method"
225
+ end
226
+
227
+ # check to see if the attribute exists and convert string to symbol for hash key
228
+ attributes = attributes.each_with_object({}) { |(k, v), h|
229
+ if (!self.class.attribute_map.key?(k.to_sym))
230
+ fail ArgumentError, "`#{k}` is not a valid attribute in `EmassClient::PoamGet`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
231
+ end
232
+ h[k.to_sym] = v
233
+ }
234
+
235
+ if attributes.key?(:'system_id')
236
+ self.system_id = attributes[:'system_id']
237
+ end
238
+
239
+ if attributes.key?(:'poam_id')
240
+ self.poam_id = attributes[:'poam_id']
241
+ end
242
+
243
+ if attributes.key?(:'display_poam_id')
244
+ self.display_poam_id = attributes[:'display_poam_id']
245
+ end
246
+
247
+ if attributes.key?(:'is_inherited')
248
+ self.is_inherited = attributes[:'is_inherited']
249
+ end
250
+
251
+ if attributes.key?(:'external_uid')
252
+ self.external_uid = attributes[:'external_uid']
253
+ end
254
+
255
+ if attributes.key?(:'control_acronyms')
256
+ self.control_acronyms = attributes[:'control_acronyms']
257
+ end
258
+
259
+ if attributes.key?(:'cci')
260
+ self.cci = attributes[:'cci']
261
+ end
262
+
263
+ if attributes.key?(:'status')
264
+ self.status = attributes[:'status']
265
+ end
266
+
267
+ if attributes.key?(:'review_status')
268
+ self.review_status = attributes[:'review_status']
269
+ end
270
+
271
+ if attributes.key?(:'vulnerability_description')
272
+ self.vulnerability_description = attributes[:'vulnerability_description']
273
+ end
274
+
275
+ if attributes.key?(:'source_ident_vuln')
276
+ self.source_ident_vuln = attributes[:'source_ident_vuln']
277
+ end
278
+
279
+ if attributes.key?(:'security_checks')
280
+ self.security_checks = attributes[:'security_checks']
281
+ end
282
+
283
+ if attributes.key?(:'milestones')
284
+ if (value = attributes[:'milestones']).is_a?(Array)
285
+ self.milestones = value
286
+ end
287
+ end
288
+
289
+ if attributes.key?(:'poc_organization')
290
+ self.poc_organization = attributes[:'poc_organization']
291
+ end
292
+
293
+ if attributes.key?(:'poc_first_name')
294
+ self.poc_first_name = attributes[:'poc_first_name']
295
+ end
296
+
297
+ if attributes.key?(:'poc_last_name')
298
+ self.poc_last_name = attributes[:'poc_last_name']
299
+ end
300
+
301
+ if attributes.key?(:'poc_email')
302
+ self.poc_email = attributes[:'poc_email']
303
+ end
304
+
305
+ if attributes.key?(:'poc_phone_number')
306
+ self.poc_phone_number = attributes[:'poc_phone_number']
307
+ end
308
+
309
+ if attributes.key?(:'severity')
310
+ self.severity = attributes[:'severity']
311
+ end
312
+
313
+ if attributes.key?(:'raw_severity')
314
+ self.raw_severity = attributes[:'raw_severity']
315
+ end
316
+
317
+ if attributes.key?(:'relevance_of_threat')
318
+ self.relevance_of_threat = attributes[:'relevance_of_threat']
319
+ end
320
+
321
+ if attributes.key?(:'likelihood')
322
+ self.likelihood = attributes[:'likelihood']
323
+ end
324
+
325
+ if attributes.key?(:'impact')
326
+ self.impact = attributes[:'impact']
327
+ end
328
+
329
+ if attributes.key?(:'impact_description')
330
+ self.impact_description = attributes[:'impact_description']
331
+ end
332
+
333
+ if attributes.key?(:'residual_risk_level')
334
+ self.residual_risk_level = attributes[:'residual_risk_level']
335
+ end
336
+
337
+ if attributes.key?(:'recommendations')
338
+ self.recommendations = attributes[:'recommendations']
339
+ end
340
+
341
+ if attributes.key?(:'resources')
342
+ self.resources = attributes[:'resources']
343
+ end
344
+
345
+ if attributes.key?(:'scheduled_completion_date')
346
+ self.scheduled_completion_date = attributes[:'scheduled_completion_date']
347
+ end
348
+
349
+ if attributes.key?(:'completion_date')
350
+ self.completion_date = attributes[:'completion_date']
351
+ end
352
+
353
+ if attributes.key?(:'extension_date')
354
+ self.extension_date = attributes[:'extension_date']
355
+ end
356
+
357
+ if attributes.key?(:'comments')
358
+ self.comments = attributes[:'comments']
359
+ end
360
+
361
+ if attributes.key?(:'mitigation')
362
+ self.mitigation = attributes[:'mitigation']
363
+ end
364
+
365
+ if attributes.key?(:'is_active')
366
+ self.is_active = attributes[:'is_active']
367
+ end
368
+ end
369
+
370
+ # Show invalid properties with the reasons. Usually used together with valid?
371
+ # @return Array for valid properties with the reasons
372
+ def list_invalid_properties
373
+ invalid_properties = Array.new
374
+ invalid_properties
375
+ end
376
+
377
+ # Check to see if the all the properties in the model are valid
378
+ # @return true if the model is valid
379
+ def valid?
380
+ status_validator = EnumAttributeValidator.new('Object', ['Ongoing', 'Risk Accepted', 'Completed', 'Not Applicable'])
381
+ return false unless status_validator.valid?(@status)
382
+ review_status_validator = EnumAttributeValidator.new('Object', ['Not Approved', 'Under Review', 'Approved'])
383
+ return false unless review_status_validator.valid?(@review_status)
384
+ severity_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
385
+ return false unless severity_validator.valid?(@severity)
386
+ raw_severity_validator = EnumAttributeValidator.new('Object', ['I', 'II', 'III'])
387
+ return false unless raw_severity_validator.valid?(@raw_severity)
388
+ relevance_of_threat_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
389
+ return false unless relevance_of_threat_validator.valid?(@relevance_of_threat)
390
+ likelihood_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
391
+ return false unless likelihood_validator.valid?(@likelihood)
392
+ impact_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
393
+ return false unless impact_validator.valid?(@impact)
394
+ residual_risk_level_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
395
+ return false unless residual_risk_level_validator.valid?(@residual_risk_level)
396
+ true
397
+ end
398
+
399
+ # Custom attribute writer method checking allowed values (enum).
400
+ # @param [Object] status Object to be assigned
401
+ def status=(status)
402
+ validator = EnumAttributeValidator.new('Object', ['Ongoing', 'Risk Accepted', 'Completed', 'Not Applicable'])
403
+ unless validator.valid?(status)
404
+ fail ArgumentError, "invalid value for \"status\", must be one of #{validator.allowable_values}."
405
+ end
406
+ @status = status
407
+ end
408
+
409
+ # Custom attribute writer method checking allowed values (enum).
410
+ # @param [Object] review_status Object to be assigned
411
+ def review_status=(review_status)
412
+ validator = EnumAttributeValidator.new('Object', ['Not Approved', 'Under Review', 'Approved'])
413
+ unless validator.valid?(review_status)
414
+ fail ArgumentError, "invalid value for \"review_status\", must be one of #{validator.allowable_values}."
415
+ end
416
+ @review_status = review_status
417
+ end
418
+
419
+ # Custom attribute writer method checking allowed values (enum).
420
+ # @param [Object] severity Object to be assigned
421
+ def severity=(severity)
422
+ validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
423
+ unless validator.valid?(severity)
424
+ fail ArgumentError, "invalid value for \"severity\", must be one of #{validator.allowable_values}."
425
+ end
426
+ @severity = severity
427
+ end
428
+
429
+ # Custom attribute writer method checking allowed values (enum).
430
+ # @param [Object] raw_severity Object to be assigned
431
+ def raw_severity=(raw_severity)
432
+ validator = EnumAttributeValidator.new('Object', ['I', 'II', 'III'])
433
+ unless validator.valid?(raw_severity)
434
+ fail ArgumentError, "invalid value for \"raw_severity\", must be one of #{validator.allowable_values}."
435
+ end
436
+ @raw_severity = raw_severity
437
+ end
438
+
439
+ # Custom attribute writer method checking allowed values (enum).
440
+ # @param [Object] relevance_of_threat Object to be assigned
441
+ def relevance_of_threat=(relevance_of_threat)
442
+ validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
443
+ unless validator.valid?(relevance_of_threat)
444
+ fail ArgumentError, "invalid value for \"relevance_of_threat\", must be one of #{validator.allowable_values}."
445
+ end
446
+ @relevance_of_threat = relevance_of_threat
447
+ end
448
+
449
+ # Custom attribute writer method checking allowed values (enum).
450
+ # @param [Object] likelihood Object to be assigned
451
+ def likelihood=(likelihood)
452
+ validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
453
+ unless validator.valid?(likelihood)
454
+ fail ArgumentError, "invalid value for \"likelihood\", must be one of #{validator.allowable_values}."
455
+ end
456
+ @likelihood = likelihood
457
+ end
458
+
459
+ # Custom attribute writer method checking allowed values (enum).
460
+ # @param [Object] impact Object to be assigned
461
+ def impact=(impact)
462
+ validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
463
+ unless validator.valid?(impact)
464
+ fail ArgumentError, "invalid value for \"impact\", must be one of #{validator.allowable_values}."
465
+ end
466
+ @impact = impact
467
+ end
468
+
469
+ # Custom attribute writer method checking allowed values (enum).
470
+ # @param [Object] residual_risk_level Object to be assigned
471
+ def residual_risk_level=(residual_risk_level)
472
+ validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High'])
473
+ unless validator.valid?(residual_risk_level)
474
+ fail ArgumentError, "invalid value for \"residual_risk_level\", must be one of #{validator.allowable_values}."
475
+ end
476
+ @residual_risk_level = residual_risk_level
477
+ end
478
+
479
+ # Checks equality by comparing each attribute.
480
+ # @param [Object] Object to be compared
481
+ def ==(o)
482
+ return true if self.equal?(o)
483
+ self.class == o.class &&
484
+ system_id == o.system_id &&
485
+ poam_id == o.poam_id &&
486
+ display_poam_id == o.display_poam_id &&
487
+ is_inherited == o.is_inherited &&
488
+ external_uid == o.external_uid &&
489
+ control_acronyms == o.control_acronyms &&
490
+ cci == o.cci &&
491
+ status == o.status &&
492
+ review_status == o.review_status &&
493
+ vulnerability_description == o.vulnerability_description &&
494
+ source_ident_vuln == o.source_ident_vuln &&
495
+ security_checks == o.security_checks &&
496
+ milestones == o.milestones &&
497
+ poc_organization == o.poc_organization &&
498
+ poc_first_name == o.poc_first_name &&
499
+ poc_last_name == o.poc_last_name &&
500
+ poc_email == o.poc_email &&
501
+ poc_phone_number == o.poc_phone_number &&
502
+ severity == o.severity &&
503
+ raw_severity == o.raw_severity &&
504
+ relevance_of_threat == o.relevance_of_threat &&
505
+ likelihood == o.likelihood &&
506
+ impact == o.impact &&
507
+ impact_description == o.impact_description &&
508
+ residual_risk_level == o.residual_risk_level &&
509
+ recommendations == o.recommendations &&
510
+ resources == o.resources &&
511
+ scheduled_completion_date == o.scheduled_completion_date &&
512
+ completion_date == o.completion_date &&
513
+ extension_date == o.extension_date &&
514
+ comments == o.comments &&
515
+ mitigation == o.mitigation &&
516
+ is_active == o.is_active
517
+ end
518
+
519
+ # @see the `==` method
520
+ # @param [Object] Object to be compared
521
+ def eql?(o)
522
+ self == o
523
+ end
524
+
525
+ # Calculates hash code according to all attributes.
526
+ # @return [Integer] Hash code
527
+ def hash
528
+ [system_id, poam_id, display_poam_id, is_inherited, external_uid, control_acronyms, cci, status, review_status, vulnerability_description, source_ident_vuln, security_checks, milestones, poc_organization, poc_first_name, poc_last_name, poc_email, poc_phone_number, severity, raw_severity, relevance_of_threat, likelihood, impact, impact_description, residual_risk_level, recommendations, resources, scheduled_completion_date, completion_date, extension_date, comments, mitigation, is_active].hash
529
+ end
530
+
531
+ # Builds the object from hash
532
+ # @param [Hash] attributes Model attributes in the form of hash
533
+ # @return [Object] Returns the model itself
534
+ def self.build_from_hash(attributes)
535
+ new.build_from_hash(attributes)
536
+ end
537
+
538
+ # Builds the object from hash
539
+ # @param [Hash] attributes Model attributes in the form of hash
540
+ # @return [Object] Returns the model itself
541
+ def build_from_hash(attributes)
542
+ return nil unless attributes.is_a?(Hash)
543
+ self.class.openapi_types.each_pair do |key, type|
544
+ if type =~ /\AArray<(.*)>/i
545
+ # check to ensure the input is an array given that the attribute
546
+ # is documented as an array but the input is not
547
+ if attributes[self.class.attribute_map[key]].is_a?(Array)
548
+ self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
549
+ end
550
+ elsif !attributes[self.class.attribute_map[key]].nil?
551
+ self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
552
+ elsif attributes[self.class.attribute_map[key]].nil? && self.class.openapi_nullable.include?(key)
553
+ self.send("#{key}=", nil)
554
+ end
555
+ end
556
+
557
+ self
558
+ end
559
+
560
+ # Deserializes the data based on type
561
+ # @param string type Data type
562
+ # @param string value Value to be deserialized
563
+ # @return [Object] Deserialized data
564
+ def _deserialize(type, value)
565
+ case type.to_sym
566
+ when :DateTime
567
+ DateTime.parse(value)
568
+ when :Date
569
+ Date.parse(value)
570
+ when :String
571
+ value.to_s
572
+ when :Integer
573
+ value.to_i
574
+ when :Float
575
+ value.to_f
576
+ when :Boolean
577
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
578
+ true
579
+ else
580
+ false
581
+ end
582
+ when :Object
583
+ # generic object (usually a Hash), return directly
584
+ value
585
+ when /\AArray<(?<inner_type>.+)>\z/
586
+ inner_type = Regexp.last_match[:inner_type]
587
+ value.map { |v| _deserialize(inner_type, v) }
588
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
589
+ k_type = Regexp.last_match[:k_type]
590
+ v_type = Regexp.last_match[:v_type]
591
+ {}.tap do |hash|
592
+ value.each do |k, v|
593
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
594
+ end
595
+ end
596
+ else # model
597
+ EmassClient.const_get(type).build_from_hash(value)
598
+ end
599
+ end
600
+
601
+ # Returns the string representation of the object
602
+ # @return [String] String presentation of the object
603
+ def to_s
604
+ to_hash.to_s
605
+ end
606
+
607
+ # to_body is an alias to to_hash (backward compatibility)
608
+ # @return [Hash] Returns the object in the form of hash
609
+ def to_body
610
+ to_hash
611
+ end
612
+
613
+ # Returns the object in the form of hash
614
+ # @return [Hash] Returns the object in the form of hash
615
+ def to_hash
616
+ hash = {}
617
+ self.class.attribute_map.each_pair do |attr, param|
618
+ value = self.send(attr)
619
+ if value.nil?
620
+ is_nullable = self.class.openapi_nullable.include?(attr)
621
+ next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
622
+ end
623
+
624
+ hash[param] = _to_hash(value)
625
+ end
626
+ hash
627
+ end
628
+
629
+ # Outputs non-array value in the form of hash
630
+ # For object, use to_hash. Otherwise, just return the value
631
+ # @param [Object] value Any valid value
632
+ # @return [Hash] Returns the value in the form of hash
633
+ def _to_hash(value)
634
+ if value.is_a?(Array)
635
+ value.compact.map { |v| _to_hash(v) }
636
+ elsif value.is_a?(Hash)
637
+ {}.tap do |hash|
638
+ value.each { |k, v| hash[k] = _to_hash(v) }
639
+ end
640
+ elsif value.respond_to? :to_hash
641
+ value.to_hash
642
+ else
643
+ value
644
+ end
645
+ end end
646
+ end