appsec_flow_anvil 0.0.1 → 0.0.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +4 -1
- data/anvil.gemspec +3 -3
- data/appsec_flow_anvil-0.0.1.gem +0 -0
- metadata +5 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8fc763b92b2d6dbeec8ccf922ea6526d865e7795
|
4
|
+
data.tar.gz: c8a921be883a33ce48017c853eb1920364b23e5d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c25579b25915c70a26b53fbbde8fffe8f5c098fd45d718f63377a3f36191fcd717f5ef221b6113423a86ec5b3cbe72ffa82984cc21af201763798363d9748691
|
7
|
+
data.tar.gz: d7b1fcfdc283da8e6292a085fde13f1e87cb92f56cbe2eff5dd20bcdbc4cf4cf1bed45df0215e32cd2ce1f74da854e484f9b37e563779d6508a15305394f8218
|
data/README.md
CHANGED
@@ -34,5 +34,8 @@ And with the client instance you can create new vulnerabilities on AppSec Flow
|
|
34
34
|
|
35
35
|
```ruby
|
36
36
|
client.vulnerabilities.create!(client_impact: 'impact_here', project_id: 9999, vulnerability_model_id: 10,
|
37
|
-
|
37
|
+
failure_type: 'others', others_protocol: 'http', others_host: 'www.mytest.com',
|
38
|
+
others_vector: 'my vector', others_steps: 'first step, second step',
|
39
|
+
evidences: ['/myfile/image.png'])
|
38
40
|
```
|
41
|
+
You can check the details on the accepted parameters here: [Vulnerability parameters details](https://github.com/aneziocampos/anvil/wiki/Vulnerability-Parameters)
|
data/anvil.gemspec
CHANGED
@@ -3,16 +3,16 @@ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
|
3
3
|
|
4
4
|
Gem::Specification.new do |s|
|
5
5
|
s.name = 'appsec_flow_anvil'
|
6
|
-
s.version = '0.0.
|
6
|
+
s.version = '0.0.2'
|
7
7
|
s.date = '2017-11-19'
|
8
|
-
s.summary = '
|
8
|
+
s.summary = 'AppSec Flow REST API Client'
|
9
9
|
s.description = 'Ruby wrapper for the REST API for Conviso Armature'
|
10
10
|
s.authors = ['Anezio Campos']
|
11
11
|
s.email = 'newdevas@gmail.com'
|
12
12
|
s.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
13
13
|
s.homepage = 'http://app.conviso.com.br'
|
14
14
|
s.license = 'MIT'
|
15
|
-
s.required_ruby_version = '2.4.2'
|
15
|
+
s.required_ruby_version = '>= 2.4.2'
|
16
16
|
s.bindir = 'exe'
|
17
17
|
s.executables = s.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
18
18
|
s.require_paths = ['lib']
|
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: appsec_flow_anvil
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Anezio Campos
|
@@ -62,6 +62,7 @@ files:
|
|
62
62
|
- Gemfile.lock
|
63
63
|
- README.md
|
64
64
|
- anvil.gemspec
|
65
|
+
- appsec_flow_anvil-0.0.1.gem
|
65
66
|
- lib/anvil.rb
|
66
67
|
- lib/anvil/client.rb
|
67
68
|
- lib/anvil/vulnerability.rb
|
@@ -76,7 +77,7 @@ require_paths:
|
|
76
77
|
- lib
|
77
78
|
required_ruby_version: !ruby/object:Gem::Requirement
|
78
79
|
requirements:
|
79
|
-
- -
|
80
|
+
- - ">="
|
80
81
|
- !ruby/object:Gem::Version
|
81
82
|
version: 2.4.2
|
82
83
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
@@ -86,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
86
87
|
version: '0'
|
87
88
|
requirements: []
|
88
89
|
rubyforge_project:
|
89
|
-
rubygems_version: 2.6
|
90
|
+
rubygems_version: 2.4.6
|
90
91
|
signing_key:
|
91
92
|
specification_version: 4
|
92
|
-
summary:
|
93
|
+
summary: AppSec Flow REST API Client
|
93
94
|
test_files: []
|