google-apis-securitycenter_v1beta1 0.7.0 → 0.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/google/apis/securitycenter_v1beta1/classes.rb +170 -2
- data/lib/google/apis/securitycenter_v1beta1/gem_version.rb +2 -2
- data/lib/google/apis/securitycenter_v1beta1/representations.rb +69 -0
- data/lib/google/apis/securitycenter_v1beta1.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 638d1b2879f81dde52afab75ca7ec5b57f62465782d8465d962b83c3767c9fd6
|
4
|
+
data.tar.gz: 6409b1fd11f0a1a502acc343b0d2f375341f5c1917dd395c4028021290940dd3
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 70be9925de3d8a602b68f4822338a592fde9ff7efebf460a4d71b104fd445ed16fb729f59a7a0c4be55512e679defb78d6a56aebd9b23498b59af98042fb13c2
|
7
|
+
data.tar.gz: 34bee107d68b1dd1342f99342916385eaf54c01dffa5dbe8cca910f18dc0a903bbd2bb947d3272005f808c59241b9484b47397c43e19eacd317a1d3307eb0d68
|
data/CHANGELOG.md
CHANGED
@@ -263,6 +263,116 @@ module Google
|
|
263
263
|
end
|
264
264
|
end
|
265
265
|
|
266
|
+
# CVE stands for Common Vulnerabilities and Exposures. More information: https://
|
267
|
+
# cve.mitre.org
|
268
|
+
class Cve
|
269
|
+
include Google::Apis::Core::Hashable
|
270
|
+
|
271
|
+
# Common Vulnerability Scoring System version 3.
|
272
|
+
# Corresponds to the JSON property `cvssv3`
|
273
|
+
# @return [Google::Apis::SecuritycenterV1beta1::Cvssv3]
|
274
|
+
attr_accessor :cvssv3
|
275
|
+
|
276
|
+
# The unique identifier for the vulnerability. e.g. CVE-2021-34527
|
277
|
+
# Corresponds to the JSON property `id`
|
278
|
+
# @return [String]
|
279
|
+
attr_accessor :id
|
280
|
+
|
281
|
+
# Additional information about the CVE. e.g. https://cve.mitre.org/cgi-bin/
|
282
|
+
# cvename.cgi?name=CVE-2021-34527
|
283
|
+
# Corresponds to the JSON property `references`
|
284
|
+
# @return [Array<Google::Apis::SecuritycenterV1beta1::Reference>]
|
285
|
+
attr_accessor :references
|
286
|
+
|
287
|
+
def initialize(**args)
|
288
|
+
update!(**args)
|
289
|
+
end
|
290
|
+
|
291
|
+
# Update properties of this object
|
292
|
+
def update!(**args)
|
293
|
+
@cvssv3 = args[:cvssv3] if args.key?(:cvssv3)
|
294
|
+
@id = args[:id] if args.key?(:id)
|
295
|
+
@references = args[:references] if args.key?(:references)
|
296
|
+
end
|
297
|
+
end
|
298
|
+
|
299
|
+
# Common Vulnerability Scoring System version 3.
|
300
|
+
class Cvssv3
|
301
|
+
include Google::Apis::Core::Hashable
|
302
|
+
|
303
|
+
# This metric describes the conditions beyond the attacker's control that must
|
304
|
+
# exist in order to exploit the vulnerability.
|
305
|
+
# Corresponds to the JSON property `attackComplexity`
|
306
|
+
# @return [String]
|
307
|
+
attr_accessor :attack_complexity
|
308
|
+
|
309
|
+
# Base Metrics Represents the intrinsic characteristics of a vulnerability that
|
310
|
+
# are constant over time and across user environments. This metric reflects the
|
311
|
+
# context by which vulnerability exploitation is possible.
|
312
|
+
# Corresponds to the JSON property `attackVector`
|
313
|
+
# @return [String]
|
314
|
+
attr_accessor :attack_vector
|
315
|
+
|
316
|
+
# This metric measures the impact to the availability of the impacted component
|
317
|
+
# resulting from a successfully exploited vulnerability.
|
318
|
+
# Corresponds to the JSON property `availabilityImpact`
|
319
|
+
# @return [String]
|
320
|
+
attr_accessor :availability_impact
|
321
|
+
|
322
|
+
# The base score is a function of the base metric scores.
|
323
|
+
# Corresponds to the JSON property `baseScore`
|
324
|
+
# @return [Float]
|
325
|
+
attr_accessor :base_score
|
326
|
+
|
327
|
+
# This metric measures the impact to the confidentiality of the information
|
328
|
+
# resources managed by a software component due to a successfully exploited
|
329
|
+
# vulnerability.
|
330
|
+
# Corresponds to the JSON property `confidentialityImpact`
|
331
|
+
# @return [String]
|
332
|
+
attr_accessor :confidentiality_impact
|
333
|
+
|
334
|
+
# This metric measures the impact to integrity of a successfully exploited
|
335
|
+
# vulnerability.
|
336
|
+
# Corresponds to the JSON property `integrityImpact`
|
337
|
+
# @return [String]
|
338
|
+
attr_accessor :integrity_impact
|
339
|
+
|
340
|
+
# This metric describes the level of privileges an attacker must possess before
|
341
|
+
# successfully exploiting the vulnerability.
|
342
|
+
# Corresponds to the JSON property `privilegesRequired`
|
343
|
+
# @return [String]
|
344
|
+
attr_accessor :privileges_required
|
345
|
+
|
346
|
+
# The Scope metric captures whether a vulnerability in one vulnerable component
|
347
|
+
# impacts resources in components beyond its security scope.
|
348
|
+
# Corresponds to the JSON property `scope`
|
349
|
+
# @return [String]
|
350
|
+
attr_accessor :scope
|
351
|
+
|
352
|
+
# This metric captures the requirement for a human user, other than the attacker,
|
353
|
+
# to participate in the successful compromise of the vulnerable component.
|
354
|
+
# Corresponds to the JSON property `userInteraction`
|
355
|
+
# @return [String]
|
356
|
+
attr_accessor :user_interaction
|
357
|
+
|
358
|
+
def initialize(**args)
|
359
|
+
update!(**args)
|
360
|
+
end
|
361
|
+
|
362
|
+
# Update properties of this object
|
363
|
+
def update!(**args)
|
364
|
+
@attack_complexity = args[:attack_complexity] if args.key?(:attack_complexity)
|
365
|
+
@attack_vector = args[:attack_vector] if args.key?(:attack_vector)
|
366
|
+
@availability_impact = args[:availability_impact] if args.key?(:availability_impact)
|
367
|
+
@base_score = args[:base_score] if args.key?(:base_score)
|
368
|
+
@confidentiality_impact = args[:confidentiality_impact] if args.key?(:confidentiality_impact)
|
369
|
+
@integrity_impact = args[:integrity_impact] if args.key?(:integrity_impact)
|
370
|
+
@privileges_required = args[:privileges_required] if args.key?(:privileges_required)
|
371
|
+
@scope = args[:scope] if args.key?(:scope)
|
372
|
+
@user_interaction = args[:user_interaction] if args.key?(:user_interaction)
|
373
|
+
end
|
374
|
+
end
|
375
|
+
|
266
376
|
# A generic empty message that you can re-use to avoid defining duplicated empty
|
267
377
|
# messages in your APIs. A typical example is to use it as the request or the
|
268
378
|
# response type of an API method. For instance: service Foo ` rpc Bar(google.
|
@@ -443,6 +553,11 @@ module Google
|
|
443
553
|
# @return [String]
|
444
554
|
attr_accessor :state
|
445
555
|
|
556
|
+
# Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
|
557
|
+
# Corresponds to the JSON property `vulnerability`
|
558
|
+
# @return [Google::Apis::SecuritycenterV1beta1::Vulnerability]
|
559
|
+
attr_accessor :vulnerability
|
560
|
+
|
446
561
|
def initialize(**args)
|
447
562
|
update!(**args)
|
448
563
|
end
|
@@ -463,6 +578,7 @@ module Google
|
|
463
578
|
@severity = args[:severity] if args.key?(:severity)
|
464
579
|
@source_properties = args[:source_properties] if args.key?(:source_properties)
|
465
580
|
@state = args[:state] if args.key?(:state)
|
581
|
+
@vulnerability = args[:vulnerability] if args.key?(:vulnerability)
|
466
582
|
end
|
467
583
|
end
|
468
584
|
|
@@ -608,6 +724,11 @@ module Google
|
|
608
724
|
# @return [String]
|
609
725
|
attr_accessor :project_display_name
|
610
726
|
|
727
|
+
# The full resource type of the resource.
|
728
|
+
# Corresponds to the JSON property `type`
|
729
|
+
# @return [String]
|
730
|
+
attr_accessor :type
|
731
|
+
|
611
732
|
def initialize(**args)
|
612
733
|
update!(**args)
|
613
734
|
end
|
@@ -620,6 +741,7 @@ module Google
|
|
620
741
|
@parent_display_name = args[:parent_display_name] if args.key?(:parent_display_name)
|
621
742
|
@project = args[:project] if args.key?(:project)
|
622
743
|
@project_display_name = args[:project_display_name] if args.key?(:project_display_name)
|
744
|
+
@type = args[:type] if args.key?(:type)
|
623
745
|
end
|
624
746
|
end
|
625
747
|
|
@@ -1652,7 +1774,7 @@ module Google
|
|
1652
1774
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
1653
1775
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
1654
1776
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
1655
|
-
# timestamp('2020-10-01T00:00:00.000Z')
|
1777
|
+
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
|
1656
1778
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
1657
1779
|
# google.com/iam/docs/).
|
1658
1780
|
class Policy
|
@@ -1718,6 +1840,32 @@ module Google
|
|
1718
1840
|
end
|
1719
1841
|
end
|
1720
1842
|
|
1843
|
+
# Additional Links
|
1844
|
+
class Reference
|
1845
|
+
include Google::Apis::Core::Hashable
|
1846
|
+
|
1847
|
+
# Source of the reference e.g. NVD
|
1848
|
+
# Corresponds to the JSON property `source`
|
1849
|
+
# @return [String]
|
1850
|
+
attr_accessor :source
|
1851
|
+
|
1852
|
+
# Uri for the mentioned source e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?
|
1853
|
+
# name=CVE-2021-34527.
|
1854
|
+
# Corresponds to the JSON property `uri`
|
1855
|
+
# @return [String]
|
1856
|
+
attr_accessor :uri
|
1857
|
+
|
1858
|
+
def initialize(**args)
|
1859
|
+
update!(**args)
|
1860
|
+
end
|
1861
|
+
|
1862
|
+
# Update properties of this object
|
1863
|
+
def update!(**args)
|
1864
|
+
@source = args[:source] if args.key?(:source)
|
1865
|
+
@uri = args[:uri] if args.key?(:uri)
|
1866
|
+
end
|
1867
|
+
end
|
1868
|
+
|
1721
1869
|
# Request message for running asset discovery for an organization.
|
1722
1870
|
class RunAssetDiscoveryRequest
|
1723
1871
|
include Google::Apis::Core::Hashable
|
@@ -1881,7 +2029,7 @@ module Google
|
|
1881
2029
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
1882
2030
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
1883
2031
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
1884
|
-
# timestamp('2020-10-01T00:00:00.000Z')
|
2032
|
+
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
|
1885
2033
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
1886
2034
|
# google.com/iam/docs/).
|
1887
2035
|
# Corresponds to the JSON property `policy`
|
@@ -2026,6 +2174,26 @@ module Google
|
|
2026
2174
|
@permissions = args[:permissions] if args.key?(:permissions)
|
2027
2175
|
end
|
2028
2176
|
end
|
2177
|
+
|
2178
|
+
# Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
|
2179
|
+
class Vulnerability
|
2180
|
+
include Google::Apis::Core::Hashable
|
2181
|
+
|
2182
|
+
# CVE stands for Common Vulnerabilities and Exposures. More information: https://
|
2183
|
+
# cve.mitre.org
|
2184
|
+
# Corresponds to the JSON property `cve`
|
2185
|
+
# @return [Google::Apis::SecuritycenterV1beta1::Cve]
|
2186
|
+
attr_accessor :cve
|
2187
|
+
|
2188
|
+
def initialize(**args)
|
2189
|
+
update!(**args)
|
2190
|
+
end
|
2191
|
+
|
2192
|
+
# Update properties of this object
|
2193
|
+
def update!(**args)
|
2194
|
+
@cve = args[:cve] if args.key?(:cve)
|
2195
|
+
end
|
2196
|
+
end
|
2029
2197
|
end
|
2030
2198
|
end
|
2031
2199
|
end
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module SecuritycenterV1beta1
|
18
18
|
# Version of the google-apis-securitycenter_v1beta1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.8.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.4.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20210820"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
@@ -58,6 +58,18 @@ module Google
|
|
58
58
|
include Google::Apis::Core::JsonObjectSupport
|
59
59
|
end
|
60
60
|
|
61
|
+
class Cve
|
62
|
+
class Representation < Google::Apis::Core::JsonRepresentation; end
|
63
|
+
|
64
|
+
include Google::Apis::Core::JsonObjectSupport
|
65
|
+
end
|
66
|
+
|
67
|
+
class Cvssv3
|
68
|
+
class Representation < Google::Apis::Core::JsonRepresentation; end
|
69
|
+
|
70
|
+
include Google::Apis::Core::JsonObjectSupport
|
71
|
+
end
|
72
|
+
|
61
73
|
class Empty
|
62
74
|
class Representation < Google::Apis::Core::JsonRepresentation; end
|
63
75
|
|
@@ -250,6 +262,12 @@ module Google
|
|
250
262
|
include Google::Apis::Core::JsonObjectSupport
|
251
263
|
end
|
252
264
|
|
265
|
+
class Reference
|
266
|
+
class Representation < Google::Apis::Core::JsonRepresentation; end
|
267
|
+
|
268
|
+
include Google::Apis::Core::JsonObjectSupport
|
269
|
+
end
|
270
|
+
|
253
271
|
class RunAssetDiscoveryRequest
|
254
272
|
class Representation < Google::Apis::Core::JsonRepresentation; end
|
255
273
|
|
@@ -304,6 +322,12 @@ module Google
|
|
304
322
|
include Google::Apis::Core::JsonObjectSupport
|
305
323
|
end
|
306
324
|
|
325
|
+
class Vulnerability
|
326
|
+
class Representation < Google::Apis::Core::JsonRepresentation; end
|
327
|
+
|
328
|
+
include Google::Apis::Core::JsonObjectSupport
|
329
|
+
end
|
330
|
+
|
307
331
|
class Asset
|
308
332
|
# @private
|
309
333
|
class Representation < Google::Apis::Core::JsonRepresentation
|
@@ -359,6 +383,32 @@ module Google
|
|
359
383
|
end
|
360
384
|
end
|
361
385
|
|
386
|
+
class Cve
|
387
|
+
# @private
|
388
|
+
class Representation < Google::Apis::Core::JsonRepresentation
|
389
|
+
property :cvssv3, as: 'cvssv3', class: Google::Apis::SecuritycenterV1beta1::Cvssv3, decorator: Google::Apis::SecuritycenterV1beta1::Cvssv3::Representation
|
390
|
+
|
391
|
+
property :id, as: 'id'
|
392
|
+
collection :references, as: 'references', class: Google::Apis::SecuritycenterV1beta1::Reference, decorator: Google::Apis::SecuritycenterV1beta1::Reference::Representation
|
393
|
+
|
394
|
+
end
|
395
|
+
end
|
396
|
+
|
397
|
+
class Cvssv3
|
398
|
+
# @private
|
399
|
+
class Representation < Google::Apis::Core::JsonRepresentation
|
400
|
+
property :attack_complexity, as: 'attackComplexity'
|
401
|
+
property :attack_vector, as: 'attackVector'
|
402
|
+
property :availability_impact, as: 'availabilityImpact'
|
403
|
+
property :base_score, as: 'baseScore'
|
404
|
+
property :confidentiality_impact, as: 'confidentialityImpact'
|
405
|
+
property :integrity_impact, as: 'integrityImpact'
|
406
|
+
property :privileges_required, as: 'privilegesRequired'
|
407
|
+
property :scope, as: 'scope'
|
408
|
+
property :user_interaction, as: 'userInteraction'
|
409
|
+
end
|
410
|
+
end
|
411
|
+
|
362
412
|
class Empty
|
363
413
|
# @private
|
364
414
|
class Representation < Google::Apis::Core::JsonRepresentation
|
@@ -394,6 +444,8 @@ module Google
|
|
394
444
|
property :severity, as: 'severity'
|
395
445
|
hash :source_properties, as: 'sourceProperties'
|
396
446
|
property :state, as: 'state'
|
447
|
+
property :vulnerability, as: 'vulnerability', class: Google::Apis::SecuritycenterV1beta1::Vulnerability, decorator: Google::Apis::SecuritycenterV1beta1::Vulnerability::Representation
|
448
|
+
|
397
449
|
end
|
398
450
|
end
|
399
451
|
|
@@ -441,6 +493,7 @@ module Google
|
|
441
493
|
property :parent_display_name, as: 'parentDisplayName'
|
442
494
|
property :project, as: 'project'
|
443
495
|
property :project_display_name, as: 'projectDisplayName'
|
496
|
+
property :type, as: 'type'
|
444
497
|
end
|
445
498
|
end
|
446
499
|
|
@@ -695,6 +748,14 @@ module Google
|
|
695
748
|
end
|
696
749
|
end
|
697
750
|
|
751
|
+
class Reference
|
752
|
+
# @private
|
753
|
+
class Representation < Google::Apis::Core::JsonRepresentation
|
754
|
+
property :source, as: 'source'
|
755
|
+
property :uri, as: 'uri'
|
756
|
+
end
|
757
|
+
end
|
758
|
+
|
698
759
|
class RunAssetDiscoveryRequest
|
699
760
|
# @private
|
700
761
|
class Representation < Google::Apis::Core::JsonRepresentation
|
@@ -769,6 +830,14 @@ module Google
|
|
769
830
|
collection :permissions, as: 'permissions'
|
770
831
|
end
|
771
832
|
end
|
833
|
+
|
834
|
+
class Vulnerability
|
835
|
+
# @private
|
836
|
+
class Representation < Google::Apis::Core::JsonRepresentation
|
837
|
+
property :cve, as: 'cve', class: Google::Apis::SecuritycenterV1beta1::Cve, decorator: Google::Apis::SecuritycenterV1beta1::Cve::Representation
|
838
|
+
|
839
|
+
end
|
840
|
+
end
|
772
841
|
end
|
773
842
|
end
|
774
843
|
end
|
@@ -30,7 +30,7 @@ module Google
|
|
30
30
|
# This is NOT the gem version.
|
31
31
|
VERSION = 'V1beta1'
|
32
32
|
|
33
|
-
# See, edit, configure, and delete your Google Cloud
|
33
|
+
# See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
|
34
34
|
AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
|
35
35
|
end
|
36
36
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-securitycenter_v1beta1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.8.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-09-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1beta1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta1/v0.8.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1beta1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|