appsec_flow_anvil 0.0.1 → 0.0.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: f1ef5f1ef6d42cffa059d9a3854c17e10327cada
4
- data.tar.gz: 2a755837a94787a33fae454806b4a2bed3d14640
3
+ metadata.gz: 8fc763b92b2d6dbeec8ccf922ea6526d865e7795
4
+ data.tar.gz: c8a921be883a33ce48017c853eb1920364b23e5d
5
5
  SHA512:
6
- metadata.gz: c1bc0a5492309d4affd43dd6518de5f09ec48244c8ba5a56524ccc1656fee61516506ddf98cda8b8afe11ddaafcf6514bbbef9113f3d903de6258bc0aa7d3d09
7
- data.tar.gz: 8ba0ca2d737060d3528af4560a19de0e28d773c2b462d5740f272226728f88480572b6cfeec05dc667f93f4bce978b06a24dac72ac93a936f7f8cc2784296df1
6
+ metadata.gz: c25579b25915c70a26b53fbbde8fffe8f5c098fd45d718f63377a3f36191fcd717f5ef221b6113423a86ec5b3cbe72ffa82984cc21af201763798363d9748691
7
+ data.tar.gz: d7b1fcfdc283da8e6292a085fde13f1e87cb92f56cbe2eff5dd20bcdbc4cf4cf1bed45df0215e32cd2ce1f74da854e484f9b37e563779d6508a15305394f8218
data/README.md CHANGED
@@ -34,5 +34,8 @@ And with the client instance you can create new vulnerabilities on AppSec Flow
34
34
 
35
35
  ```ruby
36
36
  client.vulnerabilities.create!(client_impact: 'impact_here', project_id: 9999, vulnerability_model_id: 10,
37
- failure_type: 'code_review', code_review_code: 'code', evidences: ['/myfile/image.png'])
37
+ failure_type: 'others', others_protocol: 'http', others_host: 'www.mytest.com',
38
+ others_vector: 'my vector', others_steps: 'first step, second step',
39
+ evidences: ['/myfile/image.png'])
38
40
  ```
41
+ You can check the details on the accepted parameters here: [Vulnerability parameters details](https://github.com/aneziocampos/anvil/wiki/Vulnerability-Parameters)
@@ -3,16 +3,16 @@ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
3
3
 
4
4
  Gem::Specification.new do |s|
5
5
  s.name = 'appsec_flow_anvil'
6
- s.version = '0.0.1'
6
+ s.version = '0.0.2'
7
7
  s.date = '2017-11-19'
8
- s.summary = 'Armature REST API Client'
8
+ s.summary = 'AppSec Flow REST API Client'
9
9
  s.description = 'Ruby wrapper for the REST API for Conviso Armature'
10
10
  s.authors = ['Anezio Campos']
11
11
  s.email = 'newdevas@gmail.com'
12
12
  s.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
13
13
  s.homepage = 'http://app.conviso.com.br'
14
14
  s.license = 'MIT'
15
- s.required_ruby_version = '2.4.2'
15
+ s.required_ruby_version = '>= 2.4.2'
16
16
  s.bindir = 'exe'
17
17
  s.executables = s.files.grep(%r{^exe/}) { |f| File.basename(f) }
18
18
  s.require_paths = ['lib']
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: appsec_flow_anvil
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 0.0.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anezio Campos
@@ -62,6 +62,7 @@ files:
62
62
  - Gemfile.lock
63
63
  - README.md
64
64
  - anvil.gemspec
65
+ - appsec_flow_anvil-0.0.1.gem
65
66
  - lib/anvil.rb
66
67
  - lib/anvil/client.rb
67
68
  - lib/anvil/vulnerability.rb
@@ -76,7 +77,7 @@ require_paths:
76
77
  - lib
77
78
  required_ruby_version: !ruby/object:Gem::Requirement
78
79
  requirements:
79
- - - '='
80
+ - - ">="
80
81
  - !ruby/object:Gem::Version
81
82
  version: 2.4.2
82
83
  required_rubygems_version: !ruby/object:Gem::Requirement
@@ -86,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
86
87
  version: '0'
87
88
  requirements: []
88
89
  rubyforge_project:
89
- rubygems_version: 2.6.14
90
+ rubygems_version: 2.4.6
90
91
  signing_key:
91
92
  specification_version: 4
92
- summary: Armature REST API Client
93
+ summary: AppSec Flow REST API Client
93
94
  test_files: []