appsec_flow_anvil 0.0.4 → 0.0.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +41 -0
- metadata +3 -30
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9982d40810fde04c8154aa4e1ee164c434009f2c
|
4
|
+
data.tar.gz: 0e1dd944624427643e1ceadafc0670c97454aa32
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b8da139b99e5caa644fb7d348a3a8aa6740b7846ae06a45343a52c03674f67a36a8c461fb227546f95af4441545d550dfebcc630a487832698d413f647c36970
|
7
|
+
data.tar.gz: f197055dd089c3e3465ef5a641c78d70ef0a857845f1c1ad107b7672cb7cc313571151334a7ae9aaeec2aaa70a373e53f09f1265f472b53365e6e638b045a25e
|
data/README.md
ADDED
@@ -0,0 +1,41 @@
|
|
1
|
+
# Anvil
|
2
|
+
|
3
|
+
## API version support
|
4
|
+
|
5
|
+
This client supports AppSec Flow
|
6
|
+
|
7
|
+
## Installation
|
8
|
+
|
9
|
+
The Anvil can be installed using Rubygems or Bundler.
|
10
|
+
|
11
|
+
### Rubygems
|
12
|
+
|
13
|
+
```sh
|
14
|
+
gem install appsec_flow_anvil
|
15
|
+
```
|
16
|
+
|
17
|
+
### Bundler
|
18
|
+
|
19
|
+
Add it to your Gemfile
|
20
|
+
|
21
|
+
gem "appsec_flow_anvil"
|
22
|
+
|
23
|
+
and follow normal [Bundler](http://gembundler.com/) installation and execution procedures.
|
24
|
+
|
25
|
+
## Usage
|
26
|
+
|
27
|
+
You will use an instance of Anvil::Client with your api code and environment (production, staging) as parameters.
|
28
|
+
|
29
|
+
```ruby
|
30
|
+
client = Anvil::Client.new('my_api_code', 'staging')
|
31
|
+
```
|
32
|
+
|
33
|
+
And with the client instance you can create new vulnerabilities on AppSec Flow
|
34
|
+
|
35
|
+
```ruby
|
36
|
+
client.vulnerabilities.create!(client_impact: 'impact_here', project_id: 9999, vulnerability_model_id: 10,
|
37
|
+
failure_type: 'others', others_protocol: 'http', others_host: 'www.mytest.com',
|
38
|
+
others_vector: 'my vector', others_steps: 'first step, second step',
|
39
|
+
evidences: ['/myfile/image.png'])
|
40
|
+
```
|
41
|
+
You can check the details on the accepted parameters here: [Vulnerability parameters details](https://github.com/aneziocampos/anvil/wiki/Vulnerability-Parameters)
|
metadata
CHANGED
@@ -1,12 +1,12 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: appsec_flow_anvil
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.5
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Anezio Campos
|
8
8
|
autorequire:
|
9
|
-
bindir:
|
9
|
+
bindir: bin
|
10
10
|
cert_chain: []
|
11
11
|
date: 2017-11-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
@@ -52,40 +52,13 @@ dependencies:
|
|
52
52
|
- - ">="
|
53
53
|
- !ruby/object:Gem::Version
|
54
54
|
version: '0'
|
55
|
-
- !ruby/object:Gem::Dependency
|
56
|
-
name: irbtools
|
57
|
-
requirement: !ruby/object:Gem::Requirement
|
58
|
-
requirements:
|
59
|
-
- - ">="
|
60
|
-
- !ruby/object:Gem::Version
|
61
|
-
version: '0'
|
62
|
-
type: :development
|
63
|
-
prerelease: false
|
64
|
-
version_requirements: !ruby/object:Gem::Requirement
|
65
|
-
requirements:
|
66
|
-
- - ">="
|
67
|
-
- !ruby/object:Gem::Version
|
68
|
-
version: '0'
|
69
|
-
- !ruby/object:Gem::Dependency
|
70
|
-
name: faraday
|
71
|
-
requirement: !ruby/object:Gem::Requirement
|
72
|
-
requirements:
|
73
|
-
- - ">="
|
74
|
-
- !ruby/object:Gem::Version
|
75
|
-
version: '0'
|
76
|
-
type: :runtime
|
77
|
-
prerelease: false
|
78
|
-
version_requirements: !ruby/object:Gem::Requirement
|
79
|
-
requirements:
|
80
|
-
- - ">="
|
81
|
-
- !ruby/object:Gem::Version
|
82
|
-
version: '0'
|
83
55
|
description: Ruby wrapper for the REST API for Conviso Armature
|
84
56
|
email: newdevas@gmail.com
|
85
57
|
executables: []
|
86
58
|
extensions: []
|
87
59
|
extra_rdoc_files: []
|
88
60
|
files:
|
61
|
+
- README.md
|
89
62
|
- lib/anvil.rb
|
90
63
|
- lib/anvil/client.rb
|
91
64
|
- lib/anvil/vulnerability.rb
|