appsec_flow_anvil 0.0.4 → 0.0.5

Sign up to get free protection for your applications and to get access to all the features.
Files changed (3) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +41 -0
  3. metadata +3 -30
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 3ff8d1ab07b16ca2d397a2a6da93072cb945c671
4
- data.tar.gz: 595c96417e740e418398ead332605a58e217e472
3
+ metadata.gz: 9982d40810fde04c8154aa4e1ee164c434009f2c
4
+ data.tar.gz: 0e1dd944624427643e1ceadafc0670c97454aa32
5
5
  SHA512:
6
- metadata.gz: 601cdb20b34e4b364ce05471bf2e1d8bf1be8187467dfab9435e012d0df8daaab23726dadddc932bedd5f5cc9a843013fa242c5f9a8fd2596f56f01541ab94b3
7
- data.tar.gz: 91ae9fe2824435eb9fe634420863a7773e72907e98d549fb9c2807ff605f69177aa34a46af2c8df54661dfa3668cde555b94f9e663746c598821e3568208843e
6
+ metadata.gz: b8da139b99e5caa644fb7d348a3a8aa6740b7846ae06a45343a52c03674f67a36a8c461fb227546f95af4441545d550dfebcc630a487832698d413f647c36970
7
+ data.tar.gz: f197055dd089c3e3465ef5a641c78d70ef0a857845f1c1ad107b7672cb7cc313571151334a7ae9aaeec2aaa70a373e53f09f1265f472b53365e6e638b045a25e
@@ -0,0 +1,41 @@
1
+ # Anvil
2
+
3
+ ## API version support
4
+
5
+ This client supports AppSec Flow
6
+
7
+ ## Installation
8
+
9
+ The Anvil can be installed using Rubygems or Bundler.
10
+
11
+ ### Rubygems
12
+
13
+ ```sh
14
+ gem install appsec_flow_anvil
15
+ ```
16
+
17
+ ### Bundler
18
+
19
+ Add it to your Gemfile
20
+
21
+ gem "appsec_flow_anvil"
22
+
23
+ and follow normal [Bundler](http://gembundler.com/) installation and execution procedures.
24
+
25
+ ## Usage
26
+
27
+ You will use an instance of Anvil::Client with your api code and environment (production, staging) as parameters.
28
+
29
+ ```ruby
30
+ client = Anvil::Client.new('my_api_code', 'staging')
31
+ ```
32
+
33
+ And with the client instance you can create new vulnerabilities on AppSec Flow
34
+
35
+ ```ruby
36
+ client.vulnerabilities.create!(client_impact: 'impact_here', project_id: 9999, vulnerability_model_id: 10,
37
+ failure_type: 'others', others_protocol: 'http', others_host: 'www.mytest.com',
38
+ others_vector: 'my vector', others_steps: 'first step, second step',
39
+ evidences: ['/myfile/image.png'])
40
+ ```
41
+ You can check the details on the accepted parameters here: [Vulnerability parameters details](https://github.com/aneziocampos/anvil/wiki/Vulnerability-Parameters)
metadata CHANGED
@@ -1,12 +1,12 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: appsec_flow_anvil
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.4
4
+ version: 0.0.5
5
5
  platform: ruby
6
6
  authors:
7
7
  - Anezio Campos
8
8
  autorequire:
9
- bindir: exe
9
+ bindir: bin
10
10
  cert_chain: []
11
11
  date: 2017-11-19 00:00:00.000000000 Z
12
12
  dependencies:
@@ -52,40 +52,13 @@ dependencies:
52
52
  - - ">="
53
53
  - !ruby/object:Gem::Version
54
54
  version: '0'
55
- - !ruby/object:Gem::Dependency
56
- name: irbtools
57
- requirement: !ruby/object:Gem::Requirement
58
- requirements:
59
- - - ">="
60
- - !ruby/object:Gem::Version
61
- version: '0'
62
- type: :development
63
- prerelease: false
64
- version_requirements: !ruby/object:Gem::Requirement
65
- requirements:
66
- - - ">="
67
- - !ruby/object:Gem::Version
68
- version: '0'
69
- - !ruby/object:Gem::Dependency
70
- name: faraday
71
- requirement: !ruby/object:Gem::Requirement
72
- requirements:
73
- - - ">="
74
- - !ruby/object:Gem::Version
75
- version: '0'
76
- type: :runtime
77
- prerelease: false
78
- version_requirements: !ruby/object:Gem::Requirement
79
- requirements:
80
- - - ">="
81
- - !ruby/object:Gem::Version
82
- version: '0'
83
55
  description: Ruby wrapper for the REST API for Conviso Armature
84
56
  email: newdevas@gmail.com
85
57
  executables: []
86
58
  extensions: []
87
59
  extra_rdoc_files: []
88
60
  files:
61
+ - README.md
89
62
  - lib/anvil.rb
90
63
  - lib/anvil/client.rb
91
64
  - lib/anvil/vulnerability.rb