=begin #Enterprise Mission Assurance Support Service (eMASS) #The Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) Application Programming Interface (API) enables users to perform assessments and complete actions associated with system records. The `emasser` is a command-line interface (CLI) tool that implements all of the eMASS endpoints defined in the eMASS REST API v3.2, dated October 21, 2021.

Register CLI
New users will need to register an API key with the eMASS development team prior to accessing the site for the first time. The eMASS REST API requires a client certificate (SSL/TLS, DoD PKI only) where {url}/api/register (POST) is used to register the client certificate.

Every call to the eMASS REST API will require the use of the agreed upon public key certificate and API key. The API key must be provided in the request header for all endpoint calls (api-key). If the service receives an untrusted certificate or API key, a 401 error response code will be returned along with an error message.

Available Request Headers:
key Example Value Description
`api-key` api-key-provided-by-emass This API key must be provided in the request header for all endpoint calls
`user-uid` USER.UID.KEY This User unique identifier key must be provided in the request header for all PUT, POST, and DELETE endpoint calls
Note: For DoD users this is the DoD ID Number (EIDIPI) on their DoD CAC

Approve API Client for Actionable Requests
Users are required to log-in to eMASS and grant permissions for a client to update data within eMASS on their behalf. This is only required for actionable requests (PUT, POST, DELETE). The Registration Endpoint and all GET requests can be accessed without completing this process with the correct permissions. Please note that leaving a field parameter blank (for PUT/POST requests) has the potential to clear information in the active eMASS records. To establish an account with eMASS and/or acquire an api-key/user-uid, contact one of the listed POC: OpenAPI spec version: v3.2 Contact: disa.meade.id.mbx.emass-tier-iii-support@mail.mil Generated by: https://github.com/swagger-api/swagger-codegen.git Swagger Codegen version: 3.0.26 =end require 'date' module SwaggerClient class ControlsRequestPutBody # [Required] Required to match the NIST SP 800-53 Revision 4. attr_accessor :acronym # [Required] Include written description of Responsible Entities that are responsible for the Security Control. Character Limit = 2,000. attr_accessor :responsible_entities # [Optional] Implementation Status of the Security Control for the information system. attr_accessor :implementation_status # [Conditional] Indicate the type of Common Control Provider for an “Inherited” Security Control. attr_accessor :common_control_provider # [Conditional] Provide justification for Security Controls deemed Not Applicable to the system. attr_accessor :na_justification # [Required] Control designations attr_accessor :control_designation # [Optional] Identifies the assessment method / combination that will determine if the security requirements are implemented correctly. attr_accessor :test_method # [Required] Field is required for Implementation Plan. attr_accessor :estimated_completion_date # [Required] Includes security control comments. Character Limit = 2,000. attr_accessor :implementation_narrative # [Conditional] Criticality of Security Control regarding SLCM. Character Limit = 2,000. attr_accessor :slcm_criticality # [Conditional] SLCM frequency attr_accessor :slcm_frequency # [Conditional] SLCM method utilized attr_accessor :slcm_method # [Conditional] Method for reporting Security Control for SLCM. Character Limit = 2,000. attr_accessor :slcm_reporting # [Conditional] How Non-Compliant Security Controls will be tracked for SLCM. Character Limit = 2,000. attr_accessor :slcm_tracking # [Conditional] Additional comments for Security Control regarding SLCM. Character Limit = 4,000. attr_accessor :slcm_comments # [Optional] Values include the following options (Very Low, Low, Moderate,High,Very High) attr_accessor :severity # [Optional] Include vulnerability summary. Character Limit = 2,000. attr_accessor :vulnerabilty_summary # [Optional] Include recommendations. Character Limit = 2,000. attr_accessor :recommendations # [Optional] Values include the following options (Very Low, Low, Moderate,High,Very High) attr_accessor :relevance_of_threat # [Optional] Values include the following options (Very Low, Low, Moderate,High,Very High) attr_accessor :likelihood # [Optional] Values include the following options (Very Low, Low, Moderate,High,Very High) attr_accessor :impact # [Optional] Include description of Security Control's impact. attr_accessor :impact_description # [Optional] Values include the following options (Very Low, Low, Moderate,High,Very High) attr_accessor :residual_risk_level class EnumAttributeValidator attr_reader :datatype attr_reader :allowable_values def initialize(datatype, allowable_values) @allowable_values = allowable_values.map do |value| case datatype.to_s when /Integer/i value.to_i when /Float/i value.to_f else value end end end def valid?(value) !value || allowable_values.include?(value) end end # Attribute mapping from ruby-style variable name to JSON key. def self.attribute_map { :'acronym' => :'acronym', :'responsible_entities' => :'responsibleEntities', :'implementation_status' => :'implementationStatus', :'common_control_provider' => :'commonControlProvider', :'na_justification' => :'naJustification', :'control_designation' => :'controlDesignation', :'test_method' => :'testMethod', :'estimated_completion_date' => :'estimatedCompletionDate', :'implementation_narrative' => :'implementationNarrative', :'slcm_criticality' => :'slcmCriticality', :'slcm_frequency' => :'slcmFrequency', :'slcm_method' => :'slcmMethod', :'slcm_reporting' => :'slcmReporting', :'slcm_tracking' => :'slcmTracking', :'slcm_comments' => :'slcmComments', :'severity' => :'severity', :'vulnerabilty_summary' => :'vulnerabiltySummary', :'recommendations' => :'recommendations', :'relevance_of_threat' => :'relevanceOfThreat', :'likelihood' => :'likelihood', :'impact' => :'impact', :'impact_description' => :'impactDescription', :'residual_risk_level' => :'residualRiskLevel' } end # Attribute type mapping. def self.openapi_types { :'acronym' => :'Object', :'responsible_entities' => :'Object', :'implementation_status' => :'Object', :'common_control_provider' => :'Object', :'na_justification' => :'Object', :'control_designation' => :'Object', :'test_method' => :'Object', :'estimated_completion_date' => :'Object', :'implementation_narrative' => :'Object', :'slcm_criticality' => :'Object', :'slcm_frequency' => :'Object', :'slcm_method' => :'Object', :'slcm_reporting' => :'Object', :'slcm_tracking' => :'Object', :'slcm_comments' => :'Object', :'severity' => :'Object', :'vulnerabilty_summary' => :'Object', :'recommendations' => :'Object', :'relevance_of_threat' => :'Object', :'likelihood' => :'Object', :'impact' => :'Object', :'impact_description' => :'Object', :'residual_risk_level' => :'Object' } end # List of attributes with nullable: true def self.openapi_nullable Set.new([ ]) end # Initializes the object # @param [Hash] attributes Model attributes in the form of hash def initialize(attributes = {}) if (!attributes.is_a?(Hash)) fail ArgumentError, "The input argument (attributes) must be a hash in `SwaggerClient::ControlsRequestPutBody` initialize method" end # check to see if the attribute exists and convert string to symbol for hash key attributes = attributes.each_with_object({}) { |(k, v), h| if (!self.class.attribute_map.key?(k.to_sym)) fail ArgumentError, "`#{k}` is not a valid attribute in `SwaggerClient::ControlsRequestPutBody`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect end h[k.to_sym] = v } if attributes.key?(:'acronym') self.acronym = attributes[:'acronym'] end if attributes.key?(:'responsible_entities') self.responsible_entities = attributes[:'responsible_entities'] end if attributes.key?(:'implementation_status') self.implementation_status = attributes[:'implementation_status'] end if attributes.key?(:'common_control_provider') self.common_control_provider = attributes[:'common_control_provider'] end if attributes.key?(:'na_justification') self.na_justification = attributes[:'na_justification'] end if attributes.key?(:'control_designation') self.control_designation = attributes[:'control_designation'] end if attributes.key?(:'test_method') self.test_method = attributes[:'test_method'] end if attributes.key?(:'estimated_completion_date') self.estimated_completion_date = attributes[:'estimated_completion_date'] end if attributes.key?(:'implementation_narrative') self.implementation_narrative = attributes[:'implementation_narrative'] end if attributes.key?(:'slcm_criticality') self.slcm_criticality = attributes[:'slcm_criticality'] end if attributes.key?(:'slcm_frequency') self.slcm_frequency = attributes[:'slcm_frequency'] end if attributes.key?(:'slcm_method') self.slcm_method = attributes[:'slcm_method'] end if attributes.key?(:'slcm_reporting') self.slcm_reporting = attributes[:'slcm_reporting'] end if attributes.key?(:'slcm_tracking') self.slcm_tracking = attributes[:'slcm_tracking'] end if attributes.key?(:'slcm_comments') self.slcm_comments = attributes[:'slcm_comments'] end if attributes.key?(:'severity') self.severity = attributes[:'severity'] end if attributes.key?(:'vulnerabilty_summary') self.vulnerabilty_summary = attributes[:'vulnerabilty_summary'] end if attributes.key?(:'recommendations') self.recommendations = attributes[:'recommendations'] end if attributes.key?(:'relevance_of_threat') self.relevance_of_threat = attributes[:'relevance_of_threat'] end if attributes.key?(:'likelihood') self.likelihood = attributes[:'likelihood'] end if attributes.key?(:'impact') self.impact = attributes[:'impact'] end if attributes.key?(:'impact_description') self.impact_description = attributes[:'impact_description'] end if attributes.key?(:'residual_risk_level') self.residual_risk_level = attributes[:'residual_risk_level'] end end # Show invalid properties with the reasons. Usually used together with valid? # @return Array for valid properties with the reasons def list_invalid_properties invalid_properties = Array.new if @acronym.nil? invalid_properties.push('invalid value for "acronym", acronym cannot be nil.') end if @responsible_entities.nil? invalid_properties.push('invalid value for "responsible_entities", responsible_entities cannot be nil.') end if @control_designation.nil? invalid_properties.push('invalid value for "control_designation", control_designation cannot be nil.') end if @estimated_completion_date.nil? invalid_properties.push('invalid value for "estimated_completion_date", estimated_completion_date cannot be nil.') end if @implementation_narrative.nil? invalid_properties.push('invalid value for "implementation_narrative", implementation_narrative cannot be nil.') end invalid_properties end # Check to see if the all the properties in the model are valid # @return true if the model is valid def valid? return false if @acronym.nil? return false if @responsible_entities.nil? implementation_status_validator = EnumAttributeValidator.new('Object', ['Planned', 'Implemented', 'Inherited', 'Not Applicable', 'Manually Inherited']) return false unless implementation_status_validator.valid?(@implementation_status) common_control_provider_validator = EnumAttributeValidator.new('Object', ['DoD', 'Component', 'Enclave']) return false unless common_control_provider_validator.valid?(@common_control_provider) return false if @control_designation.nil? control_designation_validator = EnumAttributeValidator.new('Object', ['Common', 'System-Specific', 'Hybrid']) return false unless control_designation_validator.valid?(@control_designation) test_method_validator = EnumAttributeValidator.new('Object', ['Test', 'Interview', 'Examine', 'Test, Interview', 'Test, Examine', 'Interview, Examine', 'Test, Interview, Examine']) return false unless test_method_validator.valid?(@test_method) return false if @estimated_completion_date.nil? return false if @implementation_narrative.nil? slcm_frequency_validator = EnumAttributeValidator.new('Object', ['Constantly', 'Daily', 'Weekly', 'Monthly', 'Quarterly', 'Semi-Annually', 'Annually', 'Every Two Years', 'Every Three Years', 'Undetermined']) return false unless slcm_frequency_validator.valid?(@slcm_frequency) slcm_method_validator = EnumAttributeValidator.new('Object', ['Automated', 'Semi-Automated', 'Manual', 'Undetermined']) return false unless slcm_method_validator.valid?(@slcm_method) severity_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) return false unless severity_validator.valid?(@severity) relevance_of_threat_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) return false unless relevance_of_threat_validator.valid?(@relevance_of_threat) likelihood_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) return false unless likelihood_validator.valid?(@likelihood) impact_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) return false unless impact_validator.valid?(@impact) residual_risk_level_validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) return false unless residual_risk_level_validator.valid?(@residual_risk_level) true end # Custom attribute writer method checking allowed values (enum). # @param [Object] implementation_status Object to be assigned def implementation_status=(implementation_status) validator = EnumAttributeValidator.new('Object', ['Planned', 'Implemented', 'Inherited', 'Not Applicable', 'Manually Inherited']) unless validator.valid?(implementation_status) fail ArgumentError, "invalid value for \"implementation_status\", must be one of #{validator.allowable_values}." end @implementation_status = implementation_status end # Custom attribute writer method checking allowed values (enum). # @param [Object] common_control_provider Object to be assigned def common_control_provider=(common_control_provider) validator = EnumAttributeValidator.new('Object', ['DoD', 'Component', 'Enclave']) unless validator.valid?(common_control_provider) fail ArgumentError, "invalid value for \"common_control_provider\", must be one of #{validator.allowable_values}." end @common_control_provider = common_control_provider end # Custom attribute writer method checking allowed values (enum). # @param [Object] control_designation Object to be assigned def control_designation=(control_designation) validator = EnumAttributeValidator.new('Object', ['Common', 'System-Specific', 'Hybrid']) unless validator.valid?(control_designation) fail ArgumentError, "invalid value for \"control_designation\", must be one of #{validator.allowable_values}." end @control_designation = control_designation end # Custom attribute writer method checking allowed values (enum). # @param [Object] test_method Object to be assigned def test_method=(test_method) validator = EnumAttributeValidator.new('Object', ['Test', 'Interview', 'Examine', 'Test, Interview', 'Test, Examine', 'Interview, Examine', 'Test, Interview, Examine']) unless validator.valid?(test_method) fail ArgumentError, "invalid value for \"test_method\", must be one of #{validator.allowable_values}." end @test_method = test_method end # Custom attribute writer method checking allowed values (enum). # @param [Object] slcm_frequency Object to be assigned def slcm_frequency=(slcm_frequency) validator = EnumAttributeValidator.new('Object', ['Constantly', 'Daily', 'Weekly', 'Monthly', 'Quarterly', 'Semi-Annually', 'Annually', 'Every Two Years', 'Every Three Years', 'Undetermined']) unless validator.valid?(slcm_frequency) fail ArgumentError, "invalid value for \"slcm_frequency\", must be one of #{validator.allowable_values}." end @slcm_frequency = slcm_frequency end # Custom attribute writer method checking allowed values (enum). # @param [Object] slcm_method Object to be assigned def slcm_method=(slcm_method) validator = EnumAttributeValidator.new('Object', ['Automated', 'Semi-Automated', 'Manual', 'Undetermined']) unless validator.valid?(slcm_method) fail ArgumentError, "invalid value for \"slcm_method\", must be one of #{validator.allowable_values}." end @slcm_method = slcm_method end # Custom attribute writer method checking allowed values (enum). # @param [Object] severity Object to be assigned def severity=(severity) validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) unless validator.valid?(severity) fail ArgumentError, "invalid value for \"severity\", must be one of #{validator.allowable_values}." end @severity = severity end # Custom attribute writer method checking allowed values (enum). # @param [Object] relevance_of_threat Object to be assigned def relevance_of_threat=(relevance_of_threat) validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) unless validator.valid?(relevance_of_threat) fail ArgumentError, "invalid value for \"relevance_of_threat\", must be one of #{validator.allowable_values}." end @relevance_of_threat = relevance_of_threat end # Custom attribute writer method checking allowed values (enum). # @param [Object] likelihood Object to be assigned def likelihood=(likelihood) validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) unless validator.valid?(likelihood) fail ArgumentError, "invalid value for \"likelihood\", must be one of #{validator.allowable_values}." end @likelihood = likelihood end # Custom attribute writer method checking allowed values (enum). # @param [Object] impact Object to be assigned def impact=(impact) validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) unless validator.valid?(impact) fail ArgumentError, "invalid value for \"impact\", must be one of #{validator.allowable_values}." end @impact = impact end # Custom attribute writer method checking allowed values (enum). # @param [Object] residual_risk_level Object to be assigned def residual_risk_level=(residual_risk_level) validator = EnumAttributeValidator.new('Object', ['Very Low', 'Low', 'Moderate', 'High', 'Very High']) unless validator.valid?(residual_risk_level) fail ArgumentError, "invalid value for \"residual_risk_level\", must be one of #{validator.allowable_values}." end @residual_risk_level = residual_risk_level end # Checks equality by comparing each attribute. # @param [Object] Object to be compared def ==(o) return true if self.equal?(o) self.class == o.class && acronym == o.acronym && responsible_entities == o.responsible_entities && implementation_status == o.implementation_status && common_control_provider == o.common_control_provider && na_justification == o.na_justification && control_designation == o.control_designation && test_method == o.test_method && estimated_completion_date == o.estimated_completion_date && implementation_narrative == o.implementation_narrative && slcm_criticality == o.slcm_criticality && slcm_frequency == o.slcm_frequency && slcm_method == o.slcm_method && slcm_reporting == o.slcm_reporting && slcm_tracking == o.slcm_tracking && slcm_comments == o.slcm_comments && severity == o.severity && vulnerabilty_summary == o.vulnerabilty_summary && recommendations == o.recommendations && relevance_of_threat == o.relevance_of_threat && likelihood == o.likelihood && impact == o.impact && impact_description == o.impact_description && residual_risk_level == o.residual_risk_level end # @see the `==` method # @param [Object] Object to be compared def eql?(o) self == o end # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash [acronym, responsible_entities, implementation_status, common_control_provider, na_justification, control_designation, test_method, estimated_completion_date, implementation_narrative, slcm_criticality, slcm_frequency, slcm_method, slcm_reporting, slcm_tracking, slcm_comments, severity, vulnerabilty_summary, recommendations, relevance_of_threat, likelihood, impact, impact_description, residual_risk_level].hash end # Builds the object from hash # @param [Hash] attributes Model attributes in the form of hash # @return [Object] Returns the model itself def self.build_from_hash(attributes) new.build_from_hash(attributes) end # Builds the object from hash # @param [Hash] attributes Model attributes in the form of hash # @return [Object] Returns the model itself def build_from_hash(attributes) return nil unless attributes.is_a?(Hash) self.class.openapi_types.each_pair do |key, type| if type =~ /\AArray<(.*)>/i # check to ensure the input is an array given that the attribute # is documented as an array but the input is not if attributes[self.class.attribute_map[key]].is_a?(Array) self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) }) end elsif !attributes[self.class.attribute_map[key]].nil? self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]])) elsif attributes[self.class.attribute_map[key]].nil? && self.class.openapi_nullable.include?(key) self.send("#{key}=", nil) end end self end # Deserializes the data based on type # @param string type Data type # @param string value Value to be deserialized # @return [Object] Deserialized data def _deserialize(type, value) case type.to_sym when :DateTime DateTime.parse(value) when :Date Date.parse(value) when :String value.to_s when :Integer value.to_i when :Float value.to_f when :Boolean if value.to_s =~ /\A(true|t|yes|y|1)\z/i true else false end when :Object # generic object (usually a Hash), return directly value when /\AArray<(?.+)>\z/ inner_type = Regexp.last_match[:inner_type] value.map { |v| _deserialize(inner_type, v) } when /\AHash<(?.+?), (?.+)>\z/ k_type = Regexp.last_match[:k_type] v_type = Regexp.last_match[:v_type] {}.tap do |hash| value.each do |k, v| hash[_deserialize(k_type, k)] = _deserialize(v_type, v) end end else # model SwaggerClient.const_get(type).build_from_hash(value) end end # Returns the string representation of the object # @return [String] String presentation of the object def to_s to_hash.to_s end # to_body is an alias to to_hash (backward compatibility) # @return [Hash] Returns the object in the form of hash def to_body to_hash end # Returns the object in the form of hash # @return [Hash] Returns the object in the form of hash def to_hash hash = {} self.class.attribute_map.each_pair do |attr, param| value = self.send(attr) if value.nil? is_nullable = self.class.openapi_nullable.include?(attr) next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) end hash[param] = _to_hash(value) end hash end # Outputs non-array value in the form of hash # For object, use to_hash. Otherwise, just return the value # @param [Object] value Any valid value # @return [Hash] Returns the value in the form of hash def _to_hash(value) if value.is_a?(Array) value.compact.map { |v| _to_hash(v) } elsif value.is_a?(Hash) {}.tap do |hash| value.each { |k, v| hash[k] = _to_hash(v) } end elsif value.respond_to? :to_hash value.to_hash else value end end end end