appsec_flow_anvil 0.0.1 → 0.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: f1ef5f1ef6d42cffa059d9a3854c17e10327cada
4
- data.tar.gz: 2a755837a94787a33fae454806b4a2bed3d14640
3
+ metadata.gz: 8fc763b92b2d6dbeec8ccf922ea6526d865e7795
4
+ data.tar.gz: c8a921be883a33ce48017c853eb1920364b23e5d
5
5
  SHA512:
6
- metadata.gz: c1bc0a5492309d4affd43dd6518de5f09ec48244c8ba5a56524ccc1656fee61516506ddf98cda8b8afe11ddaafcf6514bbbef9113f3d903de6258bc0aa7d3d09
7
- data.tar.gz: 8ba0ca2d737060d3528af4560a19de0e28d773c2b462d5740f272226728f88480572b6cfeec05dc667f93f4bce978b06a24dac72ac93a936f7f8cc2784296df1
6
+ metadata.gz: c25579b25915c70a26b53fbbde8fffe8f5c098fd45d718f63377a3f36191fcd717f5ef221b6113423a86ec5b3cbe72ffa82984cc21af201763798363d9748691
7
+ data.tar.gz: d7b1fcfdc283da8e6292a085fde13f1e87cb92f56cbe2eff5dd20bcdbc4cf4cf1bed45df0215e32cd2ce1f74da854e484f9b37e563779d6508a15305394f8218
data/README.md CHANGED
@@ -34,5 +34,8 @@ And with the client instance you can create new vulnerabilities on AppSec Flow
34
34
 
35
35
  ```ruby
36
36
  client.vulnerabilities.create!(client_impact: 'impact_here', project_id: 9999, vulnerability_model_id: 10,
37
- failure_type: 'code_review', code_review_code: 'code', evidences: ['/myfile/image.png'])
37
+ failure_type: 'others', others_protocol: 'http', others_host: 'www.mytest.com',
38
+ others_vector: 'my vector', others_steps: 'first step, second step',
39
+ evidences: ['/myfile/image.png'])
38
40
  ```
41
+ You can check the details on the accepted parameters here: [Vulnerability parameters details](https://github.com/aneziocampos/anvil/wiki/Vulnerability-Parameters)
@@ -3,16 +3,16 @@ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
3
3
 
4
4
  Gem::Specification.new do |s|
5
5
  s.name = 'appsec_flow_anvil'
6
- s.version = '0.0.1'
6
+ s.version = '0.0.2'
7
7
  s.date = '2017-11-19'
8
- s.summary = 'Armature REST API Client'
8
+ s.summary = 'AppSec Flow REST API Client'
9
9
  s.description = 'Ruby wrapper for the REST API for Conviso Armature'
10
10
  s.authors = ['Anezio Campos']
11
11
  s.email = 'newdevas@gmail.com'
12
12
  s.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
13
13
  s.homepage = 'http://app.conviso.com.br'
14
14
  s.license = 'MIT'
15
- s.required_ruby_version = '2.4.2'
15
+ s.required_ruby_version = '>= 2.4.2'
16
16
  s.bindir = 'exe'
17
17
  s.executables = s.files.grep(%r{^exe/}) { |f| File.basename(f) }
18
18
  s.require_paths = ['lib']
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: appsec_flow_anvil
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 0.0.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anezio Campos
@@ -62,6 +62,7 @@ files:
62
62
  - Gemfile.lock
63
63
  - README.md
64
64
  - anvil.gemspec
65
+ - appsec_flow_anvil-0.0.1.gem
65
66
  - lib/anvil.rb
66
67
  - lib/anvil/client.rb
67
68
  - lib/anvil/vulnerability.rb
@@ -76,7 +77,7 @@ require_paths:
76
77
  - lib
77
78
  required_ruby_version: !ruby/object:Gem::Requirement
78
79
  requirements:
79
- - - '='
80
+ - - ">="
80
81
  - !ruby/object:Gem::Version
81
82
  version: 2.4.2
82
83
  required_rubygems_version: !ruby/object:Gem::Requirement
@@ -86,8 +87,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
86
87
  version: '0'
87
88
  requirements: []
88
89
  rubyforge_project:
89
- rubygems_version: 2.6.14
90
+ rubygems_version: 2.4.6
90
91
  signing_key:
91
92
  specification_version: 4
92
- summary: Armature REST API Client
93
+ summary: AppSec Flow REST API Client
93
94
  test_files: []