google-apis-securitycenter_v1beta2 0.40.0 → 0.41.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7bc61d5fedcf4308ada5656bc25e0b2eebb9a8dd9676bcfebca23802cfbb3c6c
4
- data.tar.gz: c43bf850f1821b0cae4d89e71559669c03a6b6cb0e7c33d7ecfc8190a2846ccb
3
+ metadata.gz: 8e1d257083107d495601491a70e311e85297a3f7d28089027a243a9575750bd9
4
+ data.tar.gz: 84e58686e26522763619d6827dc7456fbab2e35477d6ff07328df923f57d37f1
5
5
  SHA512:
6
- metadata.gz: 4f1ccc3bd3b4bed02415827aeaf7c5ed431015c7f57307d462ae3888106e7a0393c5db373d9453ca2a6184e72295fe7516bbb6500d5662c742fe5597a555ff94
7
- data.tar.gz: 0dc0fea6d906861e6f27d610f8bf2c457f4e56c0028029f7d21e374e5a2006f7e54067a8701c9f659bb55835afae9b5b9ea8e99753ff1197da11e5030853604d
6
+ metadata.gz: 44def384e375b1e3a35ed86e46dd3f138c80ec3d71fbdf630019a2346e3f0250e0eb2a5ffd7aeaaf1f233d237c5ab80459650fe04d9709dd85bdf626ac702295
7
+ data.tar.gz: 3139c7260d33902541207a9659b4d335c76e37fe923a6a041461c7db57438feae6ac2486afb9d9e12b18c6acfc6bbb57d00de293b7c1b20b56d795517e829379
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-securitycenter_v1beta2
2
2
 
3
+ ### v0.41.0 (2022-12-02)
4
+
5
+ * Regenerated from discovery document revision 20221121
6
+
3
7
  ### v0.40.0 (2022-11-08)
4
8
 
5
9
  * Regenerated from discovery document revision 20221103
@@ -191,6 +191,11 @@ module Google
191
191
  # @return [String]
192
192
  attr_accessor :finding_category
193
193
 
194
+ # Full resource name of the finding.
195
+ # Corresponds to the JSON property `name`
196
+ # @return [String]
197
+ attr_accessor :name
198
+
194
199
  def initialize(**args)
195
200
  update!(**args)
196
201
  end
@@ -199,6 +204,7 @@ module Google
199
204
  def update!(**args)
200
205
  @canonical_finding_name = args[:canonical_finding_name] if args.key?(:canonical_finding_name)
201
206
  @finding_category = args[:finding_category] if args.key?(:finding_category)
207
+ @name = args[:name] if args.key?(:name)
202
208
  end
203
209
  end
204
210
 
@@ -992,6 +998,11 @@ module Google
992
998
  # @return [Google::Apis::SecuritycenterV1beta2::Indicator]
993
999
  attr_accessor :indicator
994
1000
 
1001
+ # Kernel mode rootkit signatures.
1002
+ # Corresponds to the JSON property `kernelRootkit`
1003
+ # @return [Google::Apis::SecuritycenterV1beta2::KernelRootkit]
1004
+ attr_accessor :kernel_rootkit
1005
+
995
1006
  # Kubernetes related attributes.
996
1007
  # Corresponds to the JSON property `kubernetes`
997
1008
  # @return [Google::Apis::SecuritycenterV1beta2::Kubernetes]
@@ -1119,6 +1130,7 @@ module Google
1119
1130
  @finding_class = args[:finding_class] if args.key?(:finding_class)
1120
1131
  @iam_bindings = args[:iam_bindings] if args.key?(:iam_bindings)
1121
1132
  @indicator = args[:indicator] if args.key?(:indicator)
1133
+ @kernel_rootkit = args[:kernel_rootkit] if args.key?(:kernel_rootkit)
1122
1134
  @kubernetes = args[:kubernetes] if args.key?(:kubernetes)
1123
1135
  @mitre_attack = args[:mitre_attack] if args.key?(:mitre_attack)
1124
1136
  @mute = args[:mute] if args.key?(:mute)
@@ -2102,6 +2114,87 @@ module Google
2102
2114
  end
2103
2115
  end
2104
2116
 
2117
+ # Kernel mode rootkit signatures.
2118
+ class KernelRootkit
2119
+ include Google::Apis::Core::Hashable
2120
+
2121
+ # Rootkit name when available.
2122
+ # Corresponds to the JSON property `name`
2123
+ # @return [String]
2124
+ attr_accessor :name
2125
+
2126
+ # Flag indicating unexpected modifications of kernel code memory.
2127
+ # Corresponds to the JSON property `unexpectedCodeModification`
2128
+ # @return [Boolean]
2129
+ attr_accessor :unexpected_code_modification
2130
+ alias_method :unexpected_code_modification?, :unexpected_code_modification
2131
+
2132
+ # Flag indicating presence of ftrace points with callbacks pointing to regions
2133
+ # that are not in the expected kernel or module code range.
2134
+ # Corresponds to the JSON property `unexpectedFtraceHandler`
2135
+ # @return [Boolean]
2136
+ attr_accessor :unexpected_ftrace_handler
2137
+ alias_method :unexpected_ftrace_handler?, :unexpected_ftrace_handler
2138
+
2139
+ # Flag indicating presence of interrupt handlers that are are not in the
2140
+ # expected kernel, module code regions.
2141
+ # Corresponds to the JSON property `unexpectedInterruptHandler`
2142
+ # @return [Boolean]
2143
+ attr_accessor :unexpected_interrupt_handler
2144
+ alias_method :unexpected_interrupt_handler?, :unexpected_interrupt_handler
2145
+
2146
+ # Flag indicating presence of kernel code pages that are not in the expected
2147
+ # kernel, module code regions.
2148
+ # Corresponds to the JSON property `unexpectedKernelCodePages`
2149
+ # @return [Boolean]
2150
+ attr_accessor :unexpected_kernel_code_pages
2151
+ alias_method :unexpected_kernel_code_pages?, :unexpected_kernel_code_pages
2152
+
2153
+ # Flag indicating presence of kprobe points with callbacks pointing to regions
2154
+ # that are not in the expected kernel or module code range.
2155
+ # Corresponds to the JSON property `unexpectedKprobeHandler`
2156
+ # @return [Boolean]
2157
+ attr_accessor :unexpected_kprobe_handler
2158
+ alias_method :unexpected_kprobe_handler?, :unexpected_kprobe_handler
2159
+
2160
+ # Flag indicating unexpected process(es) in the scheduler run-queue, those that
2161
+ # are in the run-queue, but not in the process task-list.
2162
+ # Corresponds to the JSON property `unexpectedProcessesInRunqueue`
2163
+ # @return [Boolean]
2164
+ attr_accessor :unexpected_processes_in_runqueue
2165
+ alias_method :unexpected_processes_in_runqueue?, :unexpected_processes_in_runqueue
2166
+
2167
+ # Flag indicating unexpected modifications of kernel read-only data memory.
2168
+ # Corresponds to the JSON property `unexpectedReadOnlyDataModification`
2169
+ # @return [Boolean]
2170
+ attr_accessor :unexpected_read_only_data_modification
2171
+ alias_method :unexpected_read_only_data_modification?, :unexpected_read_only_data_modification
2172
+
2173
+ # Flag indicating presence of system call handlers that are are not in the
2174
+ # expected kernel, module code regions.
2175
+ # Corresponds to the JSON property `unexpectedSystemCallHandler`
2176
+ # @return [Boolean]
2177
+ attr_accessor :unexpected_system_call_handler
2178
+ alias_method :unexpected_system_call_handler?, :unexpected_system_call_handler
2179
+
2180
+ def initialize(**args)
2181
+ update!(**args)
2182
+ end
2183
+
2184
+ # Update properties of this object
2185
+ def update!(**args)
2186
+ @name = args[:name] if args.key?(:name)
2187
+ @unexpected_code_modification = args[:unexpected_code_modification] if args.key?(:unexpected_code_modification)
2188
+ @unexpected_ftrace_handler = args[:unexpected_ftrace_handler] if args.key?(:unexpected_ftrace_handler)
2189
+ @unexpected_interrupt_handler = args[:unexpected_interrupt_handler] if args.key?(:unexpected_interrupt_handler)
2190
+ @unexpected_kernel_code_pages = args[:unexpected_kernel_code_pages] if args.key?(:unexpected_kernel_code_pages)
2191
+ @unexpected_kprobe_handler = args[:unexpected_kprobe_handler] if args.key?(:unexpected_kprobe_handler)
2192
+ @unexpected_processes_in_runqueue = args[:unexpected_processes_in_runqueue] if args.key?(:unexpected_processes_in_runqueue)
2193
+ @unexpected_read_only_data_modification = args[:unexpected_read_only_data_modification] if args.key?(:unexpected_read_only_data_modification)
2194
+ @unexpected_system_call_handler = args[:unexpected_system_call_handler] if args.key?(:unexpected_system_call_handler)
2195
+ end
2196
+ end
2197
+
2105
2198
  # Kubernetes related attributes.
2106
2199
  class Kubernetes
2107
2200
  include Google::Apis::Core::Hashable
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecuritycenterV1beta2
18
18
  # Version of the google-apis-securitycenter_v1beta2 gem
19
- GEM_VERSION = "0.40.0"
19
+ GEM_VERSION = "0.41.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.11.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20221103"
25
+ REVISION = "20221121"
26
26
  end
27
27
  end
28
28
  end
@@ -286,6 +286,12 @@ module Google
286
286
  include Google::Apis::Core::JsonObjectSupport
287
287
  end
288
288
 
289
+ class KernelRootkit
290
+ class Representation < Google::Apis::Core::JsonRepresentation; end
291
+
292
+ include Google::Apis::Core::JsonObjectSupport
293
+ end
294
+
289
295
  class Kubernetes
290
296
  class Representation < Google::Apis::Core::JsonRepresentation; end
291
297
 
@@ -466,6 +472,7 @@ module Google
466
472
  class Representation < Google::Apis::Core::JsonRepresentation
467
473
  property :canonical_finding_name, as: 'canonicalFindingName'
468
474
  property :finding_category, as: 'findingCategory'
475
+ property :name, as: 'name'
469
476
  end
470
477
  end
471
478
 
@@ -679,6 +686,8 @@ module Google
679
686
 
680
687
  property :indicator, as: 'indicator', class: Google::Apis::SecuritycenterV1beta2::Indicator, decorator: Google::Apis::SecuritycenterV1beta2::Indicator::Representation
681
688
 
689
+ property :kernel_rootkit, as: 'kernelRootkit', class: Google::Apis::SecuritycenterV1beta2::KernelRootkit, decorator: Google::Apis::SecuritycenterV1beta2::KernelRootkit::Representation
690
+
682
691
  property :kubernetes, as: 'kubernetes', class: Google::Apis::SecuritycenterV1beta2::Kubernetes, decorator: Google::Apis::SecuritycenterV1beta2::Kubernetes::Representation
683
692
 
684
693
  property :mitre_attack, as: 'mitreAttack', class: Google::Apis::SecuritycenterV1beta2::MitreAttack, decorator: Google::Apis::SecuritycenterV1beta2::MitreAttack::Representation
@@ -940,6 +949,21 @@ module Google
940
949
  end
941
950
  end
942
951
 
952
+ class KernelRootkit
953
+ # @private
954
+ class Representation < Google::Apis::Core::JsonRepresentation
955
+ property :name, as: 'name'
956
+ property :unexpected_code_modification, as: 'unexpectedCodeModification'
957
+ property :unexpected_ftrace_handler, as: 'unexpectedFtraceHandler'
958
+ property :unexpected_interrupt_handler, as: 'unexpectedInterruptHandler'
959
+ property :unexpected_kernel_code_pages, as: 'unexpectedKernelCodePages'
960
+ property :unexpected_kprobe_handler, as: 'unexpectedKprobeHandler'
961
+ property :unexpected_processes_in_runqueue, as: 'unexpectedProcessesInRunqueue'
962
+ property :unexpected_read_only_data_modification, as: 'unexpectedReadOnlyDataModification'
963
+ property :unexpected_system_call_handler, as: 'unexpectedSystemCallHandler'
964
+ end
965
+ end
966
+
943
967
  class Kubernetes
944
968
  # @private
945
969
  class Representation < Google::Apis::Core::JsonRepresentation
@@ -50,7 +50,12 @@ module Google
50
50
  @batch_path = 'batch'
51
51
  end
52
52
 
53
- # Get the ContainerThreatDetectionSettings resource.
53
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
54
+ # response, a missing field only indicates that it was not explicitly set, so no
55
+ # assumption should be made about these fields. In other words,
56
+ # GetContainerThreatDetectionSettings does not calculate the effective service
57
+ # settings for the resource, which accounts for inherited settings and defaults.
58
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
54
59
  # @param [String] name
55
60
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
56
61
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -84,7 +89,12 @@ module Google
84
89
  execute_or_queue_command(command, &block)
85
90
  end
86
91
 
87
- # Get the EventThreatDetectionSettings resource.
92
+ # Get the EventThreatDetectionSettings resource. In the returned settings
93
+ # response, a missing field only indicates that it was not explicitly set, so no
94
+ # assumption should be made about these fields. In other words,
95
+ # GetEventThreatDetectionSettings does not calculate the effective service
96
+ # settings for the resource, which accounts for inherited settings and defaults.
97
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
88
98
  # @param [String] name
89
99
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
90
100
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -148,7 +158,13 @@ module Google
148
158
  execute_or_queue_command(command, &block)
149
159
  end
150
160
 
151
- # Get the RapidVulnerabilityDetectionSettings resource.
161
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
162
+ # response, a missing field only indicates that it was not explicitly set, so no
163
+ # assumption should be made about these fields. In other words,
164
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
165
+ # service settings for the resource, which accounts for inherited settings and
166
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
167
+ # purpose.
152
168
  # @param [String] name
153
169
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
154
170
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -213,7 +229,12 @@ module Google
213
229
  execute_or_queue_command(command, &block)
214
230
  end
215
231
 
216
- # Get the SecurityHealthAnalyticsSettings resource.
232
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
233
+ # response, a missing field only indicates that it was not explicitly set, so no
234
+ # assumption should be made about these fields. In other words,
235
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
236
+ # settings for the resource, which accounts for inherited settings and defaults.
237
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
217
238
  # @param [String] name
218
239
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
219
240
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -246,7 +267,13 @@ module Google
246
267
  execute_or_queue_command(command, &block)
247
268
  end
248
269
 
249
- # Get the VirtualMachineThreatDetectionSettings resource.
270
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
271
+ # settings response, a missing field only indicates that it was not explicitly
272
+ # set, so no assumption should be made about these fields. In other words,
273
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
274
+ # service settings for the resource, which accounts for inherited settings and
275
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
276
+ # purpose.
250
277
  # @param [String] name
251
278
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
252
279
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -279,7 +306,12 @@ module Google
279
306
  execute_or_queue_command(command, &block)
280
307
  end
281
308
 
282
- # Get the WebSecurityScannerSettings resource.
309
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
310
+ # a missing field only indicates that it was not explicitly set, so no
311
+ # assumption should be made about these fields. In other words,
312
+ # GetWebSecurityScannerSettings does not calculate the effective service
313
+ # settings for the resource, which accounts for inherited settings and defaults.
314
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
283
315
  # @param [String] name
284
316
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
285
317
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -545,7 +577,12 @@ module Google
545
577
  end
546
578
 
547
579
  # Calculates the effective ContainerThreatDetectionSettings based on its level
548
- # in the resource hierarchy and its settings.
580
+ # in the resource hierarchy and its settings. Settings provided closer to the
581
+ # target resource take precedence over those further away (e.g. folder will
582
+ # override organization level settings). The default SCC setting for the
583
+ # detector service defaults can be overridden at organization, folder and
584
+ # project levels. No assumptions should be made about the SCC defaults as it is
585
+ # considered an internal implementation detail.
549
586
  # @param [String] name
550
587
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
551
588
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -580,7 +617,12 @@ module Google
580
617
  end
581
618
 
582
619
  # Calculates the effective EventThreatDetectionSettings based on its level in
583
- # the resource hierarchy and its settings.
620
+ # the resource hierarchy and its settings. Settings provided closer to the
621
+ # target resource take precedence over those further away (e.g. folder will
622
+ # override organization level settings). The default SCC setting for the
623
+ # detector service defaults can be overridden at organization, folder and
624
+ # project levels. No assumptions should be made about the SCC defaults as it is
625
+ # considered an internal implementation detail.
584
626
  # @param [String] name
585
627
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
586
628
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -613,7 +655,12 @@ module Google
613
655
  end
614
656
 
615
657
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
616
- # level in the resource hierarchy and its settings.
658
+ # level in the resource hierarchy and its settings. Settings provided closer to
659
+ # the target resource take precedence over those further away (e.g. folder will
660
+ # override organization level settings). The default SCC setting for the
661
+ # detector service defaults can be overridden at organization, folder and
662
+ # project levels. No assumptions should be made about the SCC defaults as it is
663
+ # considered an internal implementation detail.
617
664
  # @param [String] name
618
665
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
619
666
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -647,7 +694,12 @@ module Google
647
694
  end
648
695
 
649
696
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
650
- # the resource hierarchy and its settings.
697
+ # the resource hierarchy and its settings. Settings provided closer to the
698
+ # target resource take precedence over those further away (e.g. folder will
699
+ # override organization level settings). The default SCC setting for the
700
+ # detector service defaults can be overridden at organization, folder and
701
+ # project levels. No assumptions should be made about the SCC defaults as it is
702
+ # considered an internal implementation detail.
651
703
  # @param [String] name
652
704
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
653
705
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -681,7 +733,12 @@ module Google
681
733
  end
682
734
 
683
735
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
684
- # level in the resource hierarchy and its settings.
736
+ # level in the resource hierarchy and its settings. Settings provided closer to
737
+ # the target resource take precedence over those further away (e.g. folder will
738
+ # override organization level settings). The default SCC setting for the
739
+ # detector service defaults can be overridden at organization, folder and
740
+ # project levels. No assumptions should be made about the SCC defaults as it is
741
+ # considered an internal implementation detail.
685
742
  # @param [String] name
686
743
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
687
744
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -715,7 +772,12 @@ module Google
715
772
  end
716
773
 
717
774
  # Calculates the effective WebSecurityScannerSettings based on its level in the
718
- # resource hierarchy and its settings.
775
+ # resource hierarchy and its settings. Settings provided closer to the target
776
+ # resource take precedence over those further away (e.g. folder will override
777
+ # organization level settings). The default SCC setting for the detector service
778
+ # defaults can be overridden at organization, folder and project levels. No
779
+ # assumptions should be made about the SCC defaults as it is considered an
780
+ # internal implementation detail.
719
781
  # @param [String] name
720
782
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
721
783
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -747,7 +809,12 @@ module Google
747
809
  execute_or_queue_command(command, &block)
748
810
  end
749
811
 
750
- # Get the ContainerThreatDetectionSettings resource.
812
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
813
+ # response, a missing field only indicates that it was not explicitly set, so no
814
+ # assumption should be made about these fields. In other words,
815
+ # GetContainerThreatDetectionSettings does not calculate the effective service
816
+ # settings for the resource, which accounts for inherited settings and defaults.
817
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
751
818
  # @param [String] name
752
819
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
753
820
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -781,7 +848,12 @@ module Google
781
848
  execute_or_queue_command(command, &block)
782
849
  end
783
850
 
784
- # Get the EventThreatDetectionSettings resource.
851
+ # Get the EventThreatDetectionSettings resource. In the returned settings
852
+ # response, a missing field only indicates that it was not explicitly set, so no
853
+ # assumption should be made about these fields. In other words,
854
+ # GetEventThreatDetectionSettings does not calculate the effective service
855
+ # settings for the resource, which accounts for inherited settings and defaults.
856
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
785
857
  # @param [String] name
786
858
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
787
859
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -845,7 +917,13 @@ module Google
845
917
  execute_or_queue_command(command, &block)
846
918
  end
847
919
 
848
- # Get the RapidVulnerabilityDetectionSettings resource.
920
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
921
+ # response, a missing field only indicates that it was not explicitly set, so no
922
+ # assumption should be made about these fields. In other words,
923
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
924
+ # service settings for the resource, which accounts for inherited settings and
925
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
926
+ # purpose.
849
927
  # @param [String] name
850
928
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
851
929
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -910,7 +988,12 @@ module Google
910
988
  execute_or_queue_command(command, &block)
911
989
  end
912
990
 
913
- # Get the SecurityHealthAnalyticsSettings resource.
991
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
992
+ # response, a missing field only indicates that it was not explicitly set, so no
993
+ # assumption should be made about these fields. In other words,
994
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
995
+ # settings for the resource, which accounts for inherited settings and defaults.
996
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
914
997
  # @param [String] name
915
998
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
916
999
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -974,7 +1057,13 @@ module Google
974
1057
  execute_or_queue_command(command, &block)
975
1058
  end
976
1059
 
977
- # Get the VirtualMachineThreatDetectionSettings resource.
1060
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
1061
+ # settings response, a missing field only indicates that it was not explicitly
1062
+ # set, so no assumption should be made about these fields. In other words,
1063
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
1064
+ # service settings for the resource, which accounts for inherited settings and
1065
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
1066
+ # purpose.
978
1067
  # @param [String] name
979
1068
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
980
1069
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1007,7 +1096,12 @@ module Google
1007
1096
  execute_or_queue_command(command, &block)
1008
1097
  end
1009
1098
 
1010
- # Get the WebSecurityScannerSettings resource.
1099
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
1100
+ # a missing field only indicates that it was not explicitly set, so no
1101
+ # assumption should be made about these fields. In other words,
1102
+ # GetWebSecurityScannerSettings does not calculate the effective service
1103
+ # settings for the resource, which accounts for inherited settings and defaults.
1104
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
1011
1105
  # @param [String] name
1012
1106
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
1013
1107
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1273,7 +1367,12 @@ module Google
1273
1367
  end
1274
1368
 
1275
1369
  # Calculates the effective ContainerThreatDetectionSettings based on its level
1276
- # in the resource hierarchy and its settings.
1370
+ # in the resource hierarchy and its settings. Settings provided closer to the
1371
+ # target resource take precedence over those further away (e.g. folder will
1372
+ # override organization level settings). The default SCC setting for the
1373
+ # detector service defaults can be overridden at organization, folder and
1374
+ # project levels. No assumptions should be made about the SCC defaults as it is
1375
+ # considered an internal implementation detail.
1277
1376
  # @param [String] name
1278
1377
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
1279
1378
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -1308,7 +1407,12 @@ module Google
1308
1407
  end
1309
1408
 
1310
1409
  # Calculates the effective EventThreatDetectionSettings based on its level in
1311
- # the resource hierarchy and its settings.
1410
+ # the resource hierarchy and its settings. Settings provided closer to the
1411
+ # target resource take precedence over those further away (e.g. folder will
1412
+ # override organization level settings). The default SCC setting for the
1413
+ # detector service defaults can be overridden at organization, folder and
1414
+ # project levels. No assumptions should be made about the SCC defaults as it is
1415
+ # considered an internal implementation detail.
1312
1416
  # @param [String] name
1313
1417
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
1314
1418
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -1341,7 +1445,12 @@ module Google
1341
1445
  end
1342
1446
 
1343
1447
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
1344
- # level in the resource hierarchy and its settings.
1448
+ # level in the resource hierarchy and its settings. Settings provided closer to
1449
+ # the target resource take precedence over those further away (e.g. folder will
1450
+ # override organization level settings). The default SCC setting for the
1451
+ # detector service defaults can be overridden at organization, folder and
1452
+ # project levels. No assumptions should be made about the SCC defaults as it is
1453
+ # considered an internal implementation detail.
1345
1454
  # @param [String] name
1346
1455
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
1347
1456
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -1375,7 +1484,12 @@ module Google
1375
1484
  end
1376
1485
 
1377
1486
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
1378
- # the resource hierarchy and its settings.
1487
+ # the resource hierarchy and its settings. Settings provided closer to the
1488
+ # target resource take precedence over those further away (e.g. folder will
1489
+ # override organization level settings). The default SCC setting for the
1490
+ # detector service defaults can be overridden at organization, folder and
1491
+ # project levels. No assumptions should be made about the SCC defaults as it is
1492
+ # considered an internal implementation detail.
1379
1493
  # @param [String] name
1380
1494
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
1381
1495
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -1409,7 +1523,12 @@ module Google
1409
1523
  end
1410
1524
 
1411
1525
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
1412
- # level in the resource hierarchy and its settings.
1526
+ # level in the resource hierarchy and its settings. Settings provided closer to
1527
+ # the target resource take precedence over those further away (e.g. folder will
1528
+ # override organization level settings). The default SCC setting for the
1529
+ # detector service defaults can be overridden at organization, folder and
1530
+ # project levels. No assumptions should be made about the SCC defaults as it is
1531
+ # considered an internal implementation detail.
1413
1532
  # @param [String] name
1414
1533
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
1415
1534
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1443,7 +1562,12 @@ module Google
1443
1562
  end
1444
1563
 
1445
1564
  # Calculates the effective WebSecurityScannerSettings based on its level in the
1446
- # resource hierarchy and its settings.
1565
+ # resource hierarchy and its settings. Settings provided closer to the target
1566
+ # resource take precedence over those further away (e.g. folder will override
1567
+ # organization level settings). The default SCC setting for the detector service
1568
+ # defaults can be overridden at organization, folder and project levels. No
1569
+ # assumptions should be made about the SCC defaults as it is considered an
1570
+ # internal implementation detail.
1447
1571
  # @param [String] name
1448
1572
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
1449
1573
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1475,7 +1599,12 @@ module Google
1475
1599
  execute_or_queue_command(command, &block)
1476
1600
  end
1477
1601
 
1478
- # Get the ContainerThreatDetectionSettings resource.
1602
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
1603
+ # response, a missing field only indicates that it was not explicitly set, so no
1604
+ # assumption should be made about these fields. In other words,
1605
+ # GetContainerThreatDetectionSettings does not calculate the effective service
1606
+ # settings for the resource, which accounts for inherited settings and defaults.
1607
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
1479
1608
  # @param [String] name
1480
1609
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
1481
1610
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -1509,7 +1638,12 @@ module Google
1509
1638
  execute_or_queue_command(command, &block)
1510
1639
  end
1511
1640
 
1512
- # Get the EventThreatDetectionSettings resource.
1641
+ # Get the EventThreatDetectionSettings resource. In the returned settings
1642
+ # response, a missing field only indicates that it was not explicitly set, so no
1643
+ # assumption should be made about these fields. In other words,
1644
+ # GetEventThreatDetectionSettings does not calculate the effective service
1645
+ # settings for the resource, which accounts for inherited settings and defaults.
1646
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
1513
1647
  # @param [String] name
1514
1648
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
1515
1649
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -1573,7 +1707,13 @@ module Google
1573
1707
  execute_or_queue_command(command, &block)
1574
1708
  end
1575
1709
 
1576
- # Get the RapidVulnerabilityDetectionSettings resource.
1710
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
1711
+ # response, a missing field only indicates that it was not explicitly set, so no
1712
+ # assumption should be made about these fields. In other words,
1713
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
1714
+ # service settings for the resource, which accounts for inherited settings and
1715
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
1716
+ # purpose.
1577
1717
  # @param [String] name
1578
1718
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
1579
1719
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -1638,7 +1778,12 @@ module Google
1638
1778
  execute_or_queue_command(command, &block)
1639
1779
  end
1640
1780
 
1641
- # Get the SecurityHealthAnalyticsSettings resource.
1781
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
1782
+ # response, a missing field only indicates that it was not explicitly set, so no
1783
+ # assumption should be made about these fields. In other words,
1784
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
1785
+ # settings for the resource, which accounts for inherited settings and defaults.
1786
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
1642
1787
  # @param [String] name
1643
1788
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
1644
1789
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -1671,7 +1816,13 @@ module Google
1671
1816
  execute_or_queue_command(command, &block)
1672
1817
  end
1673
1818
 
1674
- # Get the VirtualMachineThreatDetectionSettings resource.
1819
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
1820
+ # settings response, a missing field only indicates that it was not explicitly
1821
+ # set, so no assumption should be made about these fields. In other words,
1822
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
1823
+ # service settings for the resource, which accounts for inherited settings and
1824
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
1825
+ # purpose.
1675
1826
  # @param [String] name
1676
1827
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
1677
1828
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1704,7 +1855,12 @@ module Google
1704
1855
  execute_or_queue_command(command, &block)
1705
1856
  end
1706
1857
 
1707
- # Get the WebSecurityScannerSettings resource.
1858
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
1859
+ # a missing field only indicates that it was not explicitly set, so no
1860
+ # assumption should be made about these fields. In other words,
1861
+ # GetWebSecurityScannerSettings does not calculate the effective service
1862
+ # settings for the resource, which accounts for inherited settings and defaults.
1863
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
1708
1864
  # @param [String] name
1709
1865
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
1710
1866
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1970,7 +2126,12 @@ module Google
1970
2126
  end
1971
2127
 
1972
2128
  # Calculates the effective ContainerThreatDetectionSettings based on its level
1973
- # in the resource hierarchy and its settings.
2129
+ # in the resource hierarchy and its settings. Settings provided closer to the
2130
+ # target resource take precedence over those further away (e.g. folder will
2131
+ # override organization level settings). The default SCC setting for the
2132
+ # detector service defaults can be overridden at organization, folder and
2133
+ # project levels. No assumptions should be made about the SCC defaults as it is
2134
+ # considered an internal implementation detail.
1974
2135
  # @param [String] name
1975
2136
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
1976
2137
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2005,7 +2166,12 @@ module Google
2005
2166
  end
2006
2167
 
2007
2168
  # Calculates the effective EventThreatDetectionSettings based on its level in
2008
- # the resource hierarchy and its settings.
2169
+ # the resource hierarchy and its settings. Settings provided closer to the
2170
+ # target resource take precedence over those further away (e.g. folder will
2171
+ # override organization level settings). The default SCC setting for the
2172
+ # detector service defaults can be overridden at organization, folder and
2173
+ # project levels. No assumptions should be made about the SCC defaults as it is
2174
+ # considered an internal implementation detail.
2009
2175
  # @param [String] name
2010
2176
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
2011
2177
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -2037,7 +2203,12 @@ module Google
2037
2203
  execute_or_queue_command(command, &block)
2038
2204
  end
2039
2205
 
2040
- # Get the ContainerThreatDetectionSettings resource.
2206
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
2207
+ # response, a missing field only indicates that it was not explicitly set, so no
2208
+ # assumption should be made about these fields. In other words,
2209
+ # GetContainerThreatDetectionSettings does not calculate the effective service
2210
+ # settings for the resource, which accounts for inherited settings and defaults.
2211
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
2041
2212
  # @param [String] name
2042
2213
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
2043
2214
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2112,7 +2283,12 @@ module Google
2112
2283
  end
2113
2284
 
2114
2285
  # Calculates the effective ContainerThreatDetectionSettings based on its level
2115
- # in the resource hierarchy and its settings.
2286
+ # in the resource hierarchy and its settings. Settings provided closer to the
2287
+ # target resource take precedence over those further away (e.g. folder will
2288
+ # override organization level settings). The default SCC setting for the
2289
+ # detector service defaults can be overridden at organization, folder and
2290
+ # project levels. No assumptions should be made about the SCC defaults as it is
2291
+ # considered an internal implementation detail.
2116
2292
  # @param [String] name
2117
2293
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
2118
2294
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2147,7 +2323,12 @@ module Google
2147
2323
  end
2148
2324
 
2149
2325
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
2150
- # level in the resource hierarchy and its settings.
2326
+ # level in the resource hierarchy and its settings. Settings provided closer to
2327
+ # the target resource take precedence over those further away (e.g. folder will
2328
+ # override organization level settings). The default SCC setting for the
2329
+ # detector service defaults can be overridden at organization, folder and
2330
+ # project levels. No assumptions should be made about the SCC defaults as it is
2331
+ # considered an internal implementation detail.
2151
2332
  # @param [String] name
2152
2333
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
2153
2334
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -2181,7 +2362,12 @@ module Google
2181
2362
  end
2182
2363
 
2183
2364
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
2184
- # the resource hierarchy and its settings.
2365
+ # the resource hierarchy and its settings. Settings provided closer to the
2366
+ # target resource take precedence over those further away (e.g. folder will
2367
+ # override organization level settings). The default SCC setting for the
2368
+ # detector service defaults can be overridden at organization, folder and
2369
+ # project levels. No assumptions should be made about the SCC defaults as it is
2370
+ # considered an internal implementation detail.
2185
2371
  # @param [String] name
2186
2372
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
2187
2373
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -2215,7 +2401,12 @@ module Google
2215
2401
  end
2216
2402
 
2217
2403
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
2218
- # level in the resource hierarchy and its settings.
2404
+ # level in the resource hierarchy and its settings. Settings provided closer to
2405
+ # the target resource take precedence over those further away (e.g. folder will
2406
+ # override organization level settings). The default SCC setting for the
2407
+ # detector service defaults can be overridden at organization, folder and
2408
+ # project levels. No assumptions should be made about the SCC defaults as it is
2409
+ # considered an internal implementation detail.
2219
2410
  # @param [String] name
2220
2411
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
2221
2412
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -2249,7 +2440,12 @@ module Google
2249
2440
  end
2250
2441
 
2251
2442
  # Calculates the effective WebSecurityScannerSettings based on its level in the
2252
- # resource hierarchy and its settings.
2443
+ # resource hierarchy and its settings. Settings provided closer to the target
2444
+ # resource take precedence over those further away (e.g. folder will override
2445
+ # organization level settings). The default SCC setting for the detector service
2446
+ # defaults can be overridden at organization, folder and project levels. No
2447
+ # assumptions should be made about the SCC defaults as it is considered an
2448
+ # internal implementation detail.
2253
2449
  # @param [String] name
2254
2450
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
2255
2451
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-securitycenter_v1beta2
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.40.0
4
+ version: 0.41.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-11-14 00:00:00.000000000 Z
11
+ date: 2022-12-12 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-securitycenter_v1beta2/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta2/v0.40.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta2/v0.41.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-securitycenter_v1beta2
63
63
  post_install_message:
64
64
  rdoc_options: []