google-apis-securitycenter_v1beta2 0.40.0 → 0.41.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7bc61d5fedcf4308ada5656bc25e0b2eebb9a8dd9676bcfebca23802cfbb3c6c
4
- data.tar.gz: c43bf850f1821b0cae4d89e71559669c03a6b6cb0e7c33d7ecfc8190a2846ccb
3
+ metadata.gz: 8e1d257083107d495601491a70e311e85297a3f7d28089027a243a9575750bd9
4
+ data.tar.gz: 84e58686e26522763619d6827dc7456fbab2e35477d6ff07328df923f57d37f1
5
5
  SHA512:
6
- metadata.gz: 4f1ccc3bd3b4bed02415827aeaf7c5ed431015c7f57307d462ae3888106e7a0393c5db373d9453ca2a6184e72295fe7516bbb6500d5662c742fe5597a555ff94
7
- data.tar.gz: 0dc0fea6d906861e6f27d610f8bf2c457f4e56c0028029f7d21e374e5a2006f7e54067a8701c9f659bb55835afae9b5b9ea8e99753ff1197da11e5030853604d
6
+ metadata.gz: 44def384e375b1e3a35ed86e46dd3f138c80ec3d71fbdf630019a2346e3f0250e0eb2a5ffd7aeaaf1f233d237c5ab80459650fe04d9709dd85bdf626ac702295
7
+ data.tar.gz: 3139c7260d33902541207a9659b4d335c76e37fe923a6a041461c7db57438feae6ac2486afb9d9e12b18c6acfc6bbb57d00de293b7c1b20b56d795517e829379
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-securitycenter_v1beta2
2
2
 
3
+ ### v0.41.0 (2022-12-02)
4
+
5
+ * Regenerated from discovery document revision 20221121
6
+
3
7
  ### v0.40.0 (2022-11-08)
4
8
 
5
9
  * Regenerated from discovery document revision 20221103
@@ -191,6 +191,11 @@ module Google
191
191
  # @return [String]
192
192
  attr_accessor :finding_category
193
193
 
194
+ # Full resource name of the finding.
195
+ # Corresponds to the JSON property `name`
196
+ # @return [String]
197
+ attr_accessor :name
198
+
194
199
  def initialize(**args)
195
200
  update!(**args)
196
201
  end
@@ -199,6 +204,7 @@ module Google
199
204
  def update!(**args)
200
205
  @canonical_finding_name = args[:canonical_finding_name] if args.key?(:canonical_finding_name)
201
206
  @finding_category = args[:finding_category] if args.key?(:finding_category)
207
+ @name = args[:name] if args.key?(:name)
202
208
  end
203
209
  end
204
210
 
@@ -992,6 +998,11 @@ module Google
992
998
  # @return [Google::Apis::SecuritycenterV1beta2::Indicator]
993
999
  attr_accessor :indicator
994
1000
 
1001
+ # Kernel mode rootkit signatures.
1002
+ # Corresponds to the JSON property `kernelRootkit`
1003
+ # @return [Google::Apis::SecuritycenterV1beta2::KernelRootkit]
1004
+ attr_accessor :kernel_rootkit
1005
+
995
1006
  # Kubernetes related attributes.
996
1007
  # Corresponds to the JSON property `kubernetes`
997
1008
  # @return [Google::Apis::SecuritycenterV1beta2::Kubernetes]
@@ -1119,6 +1130,7 @@ module Google
1119
1130
  @finding_class = args[:finding_class] if args.key?(:finding_class)
1120
1131
  @iam_bindings = args[:iam_bindings] if args.key?(:iam_bindings)
1121
1132
  @indicator = args[:indicator] if args.key?(:indicator)
1133
+ @kernel_rootkit = args[:kernel_rootkit] if args.key?(:kernel_rootkit)
1122
1134
  @kubernetes = args[:kubernetes] if args.key?(:kubernetes)
1123
1135
  @mitre_attack = args[:mitre_attack] if args.key?(:mitre_attack)
1124
1136
  @mute = args[:mute] if args.key?(:mute)
@@ -2102,6 +2114,87 @@ module Google
2102
2114
  end
2103
2115
  end
2104
2116
 
2117
+ # Kernel mode rootkit signatures.
2118
+ class KernelRootkit
2119
+ include Google::Apis::Core::Hashable
2120
+
2121
+ # Rootkit name when available.
2122
+ # Corresponds to the JSON property `name`
2123
+ # @return [String]
2124
+ attr_accessor :name
2125
+
2126
+ # Flag indicating unexpected modifications of kernel code memory.
2127
+ # Corresponds to the JSON property `unexpectedCodeModification`
2128
+ # @return [Boolean]
2129
+ attr_accessor :unexpected_code_modification
2130
+ alias_method :unexpected_code_modification?, :unexpected_code_modification
2131
+
2132
+ # Flag indicating presence of ftrace points with callbacks pointing to regions
2133
+ # that are not in the expected kernel or module code range.
2134
+ # Corresponds to the JSON property `unexpectedFtraceHandler`
2135
+ # @return [Boolean]
2136
+ attr_accessor :unexpected_ftrace_handler
2137
+ alias_method :unexpected_ftrace_handler?, :unexpected_ftrace_handler
2138
+
2139
+ # Flag indicating presence of interrupt handlers that are are not in the
2140
+ # expected kernel, module code regions.
2141
+ # Corresponds to the JSON property `unexpectedInterruptHandler`
2142
+ # @return [Boolean]
2143
+ attr_accessor :unexpected_interrupt_handler
2144
+ alias_method :unexpected_interrupt_handler?, :unexpected_interrupt_handler
2145
+
2146
+ # Flag indicating presence of kernel code pages that are not in the expected
2147
+ # kernel, module code regions.
2148
+ # Corresponds to the JSON property `unexpectedKernelCodePages`
2149
+ # @return [Boolean]
2150
+ attr_accessor :unexpected_kernel_code_pages
2151
+ alias_method :unexpected_kernel_code_pages?, :unexpected_kernel_code_pages
2152
+
2153
+ # Flag indicating presence of kprobe points with callbacks pointing to regions
2154
+ # that are not in the expected kernel or module code range.
2155
+ # Corresponds to the JSON property `unexpectedKprobeHandler`
2156
+ # @return [Boolean]
2157
+ attr_accessor :unexpected_kprobe_handler
2158
+ alias_method :unexpected_kprobe_handler?, :unexpected_kprobe_handler
2159
+
2160
+ # Flag indicating unexpected process(es) in the scheduler run-queue, those that
2161
+ # are in the run-queue, but not in the process task-list.
2162
+ # Corresponds to the JSON property `unexpectedProcessesInRunqueue`
2163
+ # @return [Boolean]
2164
+ attr_accessor :unexpected_processes_in_runqueue
2165
+ alias_method :unexpected_processes_in_runqueue?, :unexpected_processes_in_runqueue
2166
+
2167
+ # Flag indicating unexpected modifications of kernel read-only data memory.
2168
+ # Corresponds to the JSON property `unexpectedReadOnlyDataModification`
2169
+ # @return [Boolean]
2170
+ attr_accessor :unexpected_read_only_data_modification
2171
+ alias_method :unexpected_read_only_data_modification?, :unexpected_read_only_data_modification
2172
+
2173
+ # Flag indicating presence of system call handlers that are are not in the
2174
+ # expected kernel, module code regions.
2175
+ # Corresponds to the JSON property `unexpectedSystemCallHandler`
2176
+ # @return [Boolean]
2177
+ attr_accessor :unexpected_system_call_handler
2178
+ alias_method :unexpected_system_call_handler?, :unexpected_system_call_handler
2179
+
2180
+ def initialize(**args)
2181
+ update!(**args)
2182
+ end
2183
+
2184
+ # Update properties of this object
2185
+ def update!(**args)
2186
+ @name = args[:name] if args.key?(:name)
2187
+ @unexpected_code_modification = args[:unexpected_code_modification] if args.key?(:unexpected_code_modification)
2188
+ @unexpected_ftrace_handler = args[:unexpected_ftrace_handler] if args.key?(:unexpected_ftrace_handler)
2189
+ @unexpected_interrupt_handler = args[:unexpected_interrupt_handler] if args.key?(:unexpected_interrupt_handler)
2190
+ @unexpected_kernel_code_pages = args[:unexpected_kernel_code_pages] if args.key?(:unexpected_kernel_code_pages)
2191
+ @unexpected_kprobe_handler = args[:unexpected_kprobe_handler] if args.key?(:unexpected_kprobe_handler)
2192
+ @unexpected_processes_in_runqueue = args[:unexpected_processes_in_runqueue] if args.key?(:unexpected_processes_in_runqueue)
2193
+ @unexpected_read_only_data_modification = args[:unexpected_read_only_data_modification] if args.key?(:unexpected_read_only_data_modification)
2194
+ @unexpected_system_call_handler = args[:unexpected_system_call_handler] if args.key?(:unexpected_system_call_handler)
2195
+ end
2196
+ end
2197
+
2105
2198
  # Kubernetes related attributes.
2106
2199
  class Kubernetes
2107
2200
  include Google::Apis::Core::Hashable
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecuritycenterV1beta2
18
18
  # Version of the google-apis-securitycenter_v1beta2 gem
19
- GEM_VERSION = "0.40.0"
19
+ GEM_VERSION = "0.41.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.11.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20221103"
25
+ REVISION = "20221121"
26
26
  end
27
27
  end
28
28
  end
@@ -286,6 +286,12 @@ module Google
286
286
  include Google::Apis::Core::JsonObjectSupport
287
287
  end
288
288
 
289
+ class KernelRootkit
290
+ class Representation < Google::Apis::Core::JsonRepresentation; end
291
+
292
+ include Google::Apis::Core::JsonObjectSupport
293
+ end
294
+
289
295
  class Kubernetes
290
296
  class Representation < Google::Apis::Core::JsonRepresentation; end
291
297
 
@@ -466,6 +472,7 @@ module Google
466
472
  class Representation < Google::Apis::Core::JsonRepresentation
467
473
  property :canonical_finding_name, as: 'canonicalFindingName'
468
474
  property :finding_category, as: 'findingCategory'
475
+ property :name, as: 'name'
469
476
  end
470
477
  end
471
478
 
@@ -679,6 +686,8 @@ module Google
679
686
 
680
687
  property :indicator, as: 'indicator', class: Google::Apis::SecuritycenterV1beta2::Indicator, decorator: Google::Apis::SecuritycenterV1beta2::Indicator::Representation
681
688
 
689
+ property :kernel_rootkit, as: 'kernelRootkit', class: Google::Apis::SecuritycenterV1beta2::KernelRootkit, decorator: Google::Apis::SecuritycenterV1beta2::KernelRootkit::Representation
690
+
682
691
  property :kubernetes, as: 'kubernetes', class: Google::Apis::SecuritycenterV1beta2::Kubernetes, decorator: Google::Apis::SecuritycenterV1beta2::Kubernetes::Representation
683
692
 
684
693
  property :mitre_attack, as: 'mitreAttack', class: Google::Apis::SecuritycenterV1beta2::MitreAttack, decorator: Google::Apis::SecuritycenterV1beta2::MitreAttack::Representation
@@ -940,6 +949,21 @@ module Google
940
949
  end
941
950
  end
942
951
 
952
+ class KernelRootkit
953
+ # @private
954
+ class Representation < Google::Apis::Core::JsonRepresentation
955
+ property :name, as: 'name'
956
+ property :unexpected_code_modification, as: 'unexpectedCodeModification'
957
+ property :unexpected_ftrace_handler, as: 'unexpectedFtraceHandler'
958
+ property :unexpected_interrupt_handler, as: 'unexpectedInterruptHandler'
959
+ property :unexpected_kernel_code_pages, as: 'unexpectedKernelCodePages'
960
+ property :unexpected_kprobe_handler, as: 'unexpectedKprobeHandler'
961
+ property :unexpected_processes_in_runqueue, as: 'unexpectedProcessesInRunqueue'
962
+ property :unexpected_read_only_data_modification, as: 'unexpectedReadOnlyDataModification'
963
+ property :unexpected_system_call_handler, as: 'unexpectedSystemCallHandler'
964
+ end
965
+ end
966
+
943
967
  class Kubernetes
944
968
  # @private
945
969
  class Representation < Google::Apis::Core::JsonRepresentation
@@ -50,7 +50,12 @@ module Google
50
50
  @batch_path = 'batch'
51
51
  end
52
52
 
53
- # Get the ContainerThreatDetectionSettings resource.
53
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
54
+ # response, a missing field only indicates that it was not explicitly set, so no
55
+ # assumption should be made about these fields. In other words,
56
+ # GetContainerThreatDetectionSettings does not calculate the effective service
57
+ # settings for the resource, which accounts for inherited settings and defaults.
58
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
54
59
  # @param [String] name
55
60
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
56
61
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -84,7 +89,12 @@ module Google
84
89
  execute_or_queue_command(command, &block)
85
90
  end
86
91
 
87
- # Get the EventThreatDetectionSettings resource.
92
+ # Get the EventThreatDetectionSettings resource. In the returned settings
93
+ # response, a missing field only indicates that it was not explicitly set, so no
94
+ # assumption should be made about these fields. In other words,
95
+ # GetEventThreatDetectionSettings does not calculate the effective service
96
+ # settings for the resource, which accounts for inherited settings and defaults.
97
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
88
98
  # @param [String] name
89
99
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
90
100
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -148,7 +158,13 @@ module Google
148
158
  execute_or_queue_command(command, &block)
149
159
  end
150
160
 
151
- # Get the RapidVulnerabilityDetectionSettings resource.
161
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
162
+ # response, a missing field only indicates that it was not explicitly set, so no
163
+ # assumption should be made about these fields. In other words,
164
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
165
+ # service settings for the resource, which accounts for inherited settings and
166
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
167
+ # purpose.
152
168
  # @param [String] name
153
169
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
154
170
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -213,7 +229,12 @@ module Google
213
229
  execute_or_queue_command(command, &block)
214
230
  end
215
231
 
216
- # Get the SecurityHealthAnalyticsSettings resource.
232
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
233
+ # response, a missing field only indicates that it was not explicitly set, so no
234
+ # assumption should be made about these fields. In other words,
235
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
236
+ # settings for the resource, which accounts for inherited settings and defaults.
237
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
217
238
  # @param [String] name
218
239
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
219
240
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -246,7 +267,13 @@ module Google
246
267
  execute_or_queue_command(command, &block)
247
268
  end
248
269
 
249
- # Get the VirtualMachineThreatDetectionSettings resource.
270
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
271
+ # settings response, a missing field only indicates that it was not explicitly
272
+ # set, so no assumption should be made about these fields. In other words,
273
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
274
+ # service settings for the resource, which accounts for inherited settings and
275
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
276
+ # purpose.
250
277
  # @param [String] name
251
278
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
252
279
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -279,7 +306,12 @@ module Google
279
306
  execute_or_queue_command(command, &block)
280
307
  end
281
308
 
282
- # Get the WebSecurityScannerSettings resource.
309
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
310
+ # a missing field only indicates that it was not explicitly set, so no
311
+ # assumption should be made about these fields. In other words,
312
+ # GetWebSecurityScannerSettings does not calculate the effective service
313
+ # settings for the resource, which accounts for inherited settings and defaults.
314
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
283
315
  # @param [String] name
284
316
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
285
317
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -545,7 +577,12 @@ module Google
545
577
  end
546
578
 
547
579
  # Calculates the effective ContainerThreatDetectionSettings based on its level
548
- # in the resource hierarchy and its settings.
580
+ # in the resource hierarchy and its settings. Settings provided closer to the
581
+ # target resource take precedence over those further away (e.g. folder will
582
+ # override organization level settings). The default SCC setting for the
583
+ # detector service defaults can be overridden at organization, folder and
584
+ # project levels. No assumptions should be made about the SCC defaults as it is
585
+ # considered an internal implementation detail.
549
586
  # @param [String] name
550
587
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
551
588
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -580,7 +617,12 @@ module Google
580
617
  end
581
618
 
582
619
  # Calculates the effective EventThreatDetectionSettings based on its level in
583
- # the resource hierarchy and its settings.
620
+ # the resource hierarchy and its settings. Settings provided closer to the
621
+ # target resource take precedence over those further away (e.g. folder will
622
+ # override organization level settings). The default SCC setting for the
623
+ # detector service defaults can be overridden at organization, folder and
624
+ # project levels. No assumptions should be made about the SCC defaults as it is
625
+ # considered an internal implementation detail.
584
626
  # @param [String] name
585
627
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
586
628
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -613,7 +655,12 @@ module Google
613
655
  end
614
656
 
615
657
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
616
- # level in the resource hierarchy and its settings.
658
+ # level in the resource hierarchy and its settings. Settings provided closer to
659
+ # the target resource take precedence over those further away (e.g. folder will
660
+ # override organization level settings). The default SCC setting for the
661
+ # detector service defaults can be overridden at organization, folder and
662
+ # project levels. No assumptions should be made about the SCC defaults as it is
663
+ # considered an internal implementation detail.
617
664
  # @param [String] name
618
665
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
619
666
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -647,7 +694,12 @@ module Google
647
694
  end
648
695
 
649
696
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
650
- # the resource hierarchy and its settings.
697
+ # the resource hierarchy and its settings. Settings provided closer to the
698
+ # target resource take precedence over those further away (e.g. folder will
699
+ # override organization level settings). The default SCC setting for the
700
+ # detector service defaults can be overridden at organization, folder and
701
+ # project levels. No assumptions should be made about the SCC defaults as it is
702
+ # considered an internal implementation detail.
651
703
  # @param [String] name
652
704
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
653
705
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -681,7 +733,12 @@ module Google
681
733
  end
682
734
 
683
735
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
684
- # level in the resource hierarchy and its settings.
736
+ # level in the resource hierarchy and its settings. Settings provided closer to
737
+ # the target resource take precedence over those further away (e.g. folder will
738
+ # override organization level settings). The default SCC setting for the
739
+ # detector service defaults can be overridden at organization, folder and
740
+ # project levels. No assumptions should be made about the SCC defaults as it is
741
+ # considered an internal implementation detail.
685
742
  # @param [String] name
686
743
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
687
744
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -715,7 +772,12 @@ module Google
715
772
  end
716
773
 
717
774
  # Calculates the effective WebSecurityScannerSettings based on its level in the
718
- # resource hierarchy and its settings.
775
+ # resource hierarchy and its settings. Settings provided closer to the target
776
+ # resource take precedence over those further away (e.g. folder will override
777
+ # organization level settings). The default SCC setting for the detector service
778
+ # defaults can be overridden at organization, folder and project levels. No
779
+ # assumptions should be made about the SCC defaults as it is considered an
780
+ # internal implementation detail.
719
781
  # @param [String] name
720
782
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
721
783
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -747,7 +809,12 @@ module Google
747
809
  execute_or_queue_command(command, &block)
748
810
  end
749
811
 
750
- # Get the ContainerThreatDetectionSettings resource.
812
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
813
+ # response, a missing field only indicates that it was not explicitly set, so no
814
+ # assumption should be made about these fields. In other words,
815
+ # GetContainerThreatDetectionSettings does not calculate the effective service
816
+ # settings for the resource, which accounts for inherited settings and defaults.
817
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
751
818
  # @param [String] name
752
819
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
753
820
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -781,7 +848,12 @@ module Google
781
848
  execute_or_queue_command(command, &block)
782
849
  end
783
850
 
784
- # Get the EventThreatDetectionSettings resource.
851
+ # Get the EventThreatDetectionSettings resource. In the returned settings
852
+ # response, a missing field only indicates that it was not explicitly set, so no
853
+ # assumption should be made about these fields. In other words,
854
+ # GetEventThreatDetectionSettings does not calculate the effective service
855
+ # settings for the resource, which accounts for inherited settings and defaults.
856
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
785
857
  # @param [String] name
786
858
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
787
859
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -845,7 +917,13 @@ module Google
845
917
  execute_or_queue_command(command, &block)
846
918
  end
847
919
 
848
- # Get the RapidVulnerabilityDetectionSettings resource.
920
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
921
+ # response, a missing field only indicates that it was not explicitly set, so no
922
+ # assumption should be made about these fields. In other words,
923
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
924
+ # service settings for the resource, which accounts for inherited settings and
925
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
926
+ # purpose.
849
927
  # @param [String] name
850
928
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
851
929
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -910,7 +988,12 @@ module Google
910
988
  execute_or_queue_command(command, &block)
911
989
  end
912
990
 
913
- # Get the SecurityHealthAnalyticsSettings resource.
991
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
992
+ # response, a missing field only indicates that it was not explicitly set, so no
993
+ # assumption should be made about these fields. In other words,
994
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
995
+ # settings for the resource, which accounts for inherited settings and defaults.
996
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
914
997
  # @param [String] name
915
998
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
916
999
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -974,7 +1057,13 @@ module Google
974
1057
  execute_or_queue_command(command, &block)
975
1058
  end
976
1059
 
977
- # Get the VirtualMachineThreatDetectionSettings resource.
1060
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
1061
+ # settings response, a missing field only indicates that it was not explicitly
1062
+ # set, so no assumption should be made about these fields. In other words,
1063
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
1064
+ # service settings for the resource, which accounts for inherited settings and
1065
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
1066
+ # purpose.
978
1067
  # @param [String] name
979
1068
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
980
1069
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1007,7 +1096,12 @@ module Google
1007
1096
  execute_or_queue_command(command, &block)
1008
1097
  end
1009
1098
 
1010
- # Get the WebSecurityScannerSettings resource.
1099
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
1100
+ # a missing field only indicates that it was not explicitly set, so no
1101
+ # assumption should be made about these fields. In other words,
1102
+ # GetWebSecurityScannerSettings does not calculate the effective service
1103
+ # settings for the resource, which accounts for inherited settings and defaults.
1104
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
1011
1105
  # @param [String] name
1012
1106
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
1013
1107
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1273,7 +1367,12 @@ module Google
1273
1367
  end
1274
1368
 
1275
1369
  # Calculates the effective ContainerThreatDetectionSettings based on its level
1276
- # in the resource hierarchy and its settings.
1370
+ # in the resource hierarchy and its settings. Settings provided closer to the
1371
+ # target resource take precedence over those further away (e.g. folder will
1372
+ # override organization level settings). The default SCC setting for the
1373
+ # detector service defaults can be overridden at organization, folder and
1374
+ # project levels. No assumptions should be made about the SCC defaults as it is
1375
+ # considered an internal implementation detail.
1277
1376
  # @param [String] name
1278
1377
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
1279
1378
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -1308,7 +1407,12 @@ module Google
1308
1407
  end
1309
1408
 
1310
1409
  # Calculates the effective EventThreatDetectionSettings based on its level in
1311
- # the resource hierarchy and its settings.
1410
+ # the resource hierarchy and its settings. Settings provided closer to the
1411
+ # target resource take precedence over those further away (e.g. folder will
1412
+ # override organization level settings). The default SCC setting for the
1413
+ # detector service defaults can be overridden at organization, folder and
1414
+ # project levels. No assumptions should be made about the SCC defaults as it is
1415
+ # considered an internal implementation detail.
1312
1416
  # @param [String] name
1313
1417
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
1314
1418
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -1341,7 +1445,12 @@ module Google
1341
1445
  end
1342
1446
 
1343
1447
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
1344
- # level in the resource hierarchy and its settings.
1448
+ # level in the resource hierarchy and its settings. Settings provided closer to
1449
+ # the target resource take precedence over those further away (e.g. folder will
1450
+ # override organization level settings). The default SCC setting for the
1451
+ # detector service defaults can be overridden at organization, folder and
1452
+ # project levels. No assumptions should be made about the SCC defaults as it is
1453
+ # considered an internal implementation detail.
1345
1454
  # @param [String] name
1346
1455
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
1347
1456
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -1375,7 +1484,12 @@ module Google
1375
1484
  end
1376
1485
 
1377
1486
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
1378
- # the resource hierarchy and its settings.
1487
+ # the resource hierarchy and its settings. Settings provided closer to the
1488
+ # target resource take precedence over those further away (e.g. folder will
1489
+ # override organization level settings). The default SCC setting for the
1490
+ # detector service defaults can be overridden at organization, folder and
1491
+ # project levels. No assumptions should be made about the SCC defaults as it is
1492
+ # considered an internal implementation detail.
1379
1493
  # @param [String] name
1380
1494
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
1381
1495
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -1409,7 +1523,12 @@ module Google
1409
1523
  end
1410
1524
 
1411
1525
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
1412
- # level in the resource hierarchy and its settings.
1526
+ # level in the resource hierarchy and its settings. Settings provided closer to
1527
+ # the target resource take precedence over those further away (e.g. folder will
1528
+ # override organization level settings). The default SCC setting for the
1529
+ # detector service defaults can be overridden at organization, folder and
1530
+ # project levels. No assumptions should be made about the SCC defaults as it is
1531
+ # considered an internal implementation detail.
1413
1532
  # @param [String] name
1414
1533
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
1415
1534
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1443,7 +1562,12 @@ module Google
1443
1562
  end
1444
1563
 
1445
1564
  # Calculates the effective WebSecurityScannerSettings based on its level in the
1446
- # resource hierarchy and its settings.
1565
+ # resource hierarchy and its settings. Settings provided closer to the target
1566
+ # resource take precedence over those further away (e.g. folder will override
1567
+ # organization level settings). The default SCC setting for the detector service
1568
+ # defaults can be overridden at organization, folder and project levels. No
1569
+ # assumptions should be made about the SCC defaults as it is considered an
1570
+ # internal implementation detail.
1447
1571
  # @param [String] name
1448
1572
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
1449
1573
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1475,7 +1599,12 @@ module Google
1475
1599
  execute_or_queue_command(command, &block)
1476
1600
  end
1477
1601
 
1478
- # Get the ContainerThreatDetectionSettings resource.
1602
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
1603
+ # response, a missing field only indicates that it was not explicitly set, so no
1604
+ # assumption should be made about these fields. In other words,
1605
+ # GetContainerThreatDetectionSettings does not calculate the effective service
1606
+ # settings for the resource, which accounts for inherited settings and defaults.
1607
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
1479
1608
  # @param [String] name
1480
1609
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
1481
1610
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -1509,7 +1638,12 @@ module Google
1509
1638
  execute_or_queue_command(command, &block)
1510
1639
  end
1511
1640
 
1512
- # Get the EventThreatDetectionSettings resource.
1641
+ # Get the EventThreatDetectionSettings resource. In the returned settings
1642
+ # response, a missing field only indicates that it was not explicitly set, so no
1643
+ # assumption should be made about these fields. In other words,
1644
+ # GetEventThreatDetectionSettings does not calculate the effective service
1645
+ # settings for the resource, which accounts for inherited settings and defaults.
1646
+ # Instead, use CalculateEventThreatDetectionSettings for this purpose.
1513
1647
  # @param [String] name
1514
1648
  # Required. The name of the EventThreatDetectionSettings to retrieve. Formats: *
1515
1649
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -1573,7 +1707,13 @@ module Google
1573
1707
  execute_or_queue_command(command, &block)
1574
1708
  end
1575
1709
 
1576
- # Get the RapidVulnerabilityDetectionSettings resource.
1710
+ # Get the RapidVulnerabilityDetectionSettings resource. In the returned settings
1711
+ # response, a missing field only indicates that it was not explicitly set, so no
1712
+ # assumption should be made about these fields. In other words,
1713
+ # GetRapidVulnerabilityDetectionSettings does not calculate the effective
1714
+ # service settings for the resource, which accounts for inherited settings and
1715
+ # defaults. Instead, use CalculateRapidVulnerabilityDetectionSettings for this
1716
+ # purpose.
1577
1717
  # @param [String] name
1578
1718
  # Required. The name of the RapidVulnerabilityDetectionSettings to retrieve.
1579
1719
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -1638,7 +1778,12 @@ module Google
1638
1778
  execute_or_queue_command(command, &block)
1639
1779
  end
1640
1780
 
1641
- # Get the SecurityHealthAnalyticsSettings resource.
1781
+ # Get the SecurityHealthAnalyticsSettings resource. In the returned settings
1782
+ # response, a missing field only indicates that it was not explicitly set, so no
1783
+ # assumption should be made about these fields. In other words,
1784
+ # GetSecurityHealthAnalyticsSettings does not calculate the effective service
1785
+ # settings for the resource, which accounts for inherited settings and defaults.
1786
+ # Instead, use CalculateSecurityHealthAnalyticsSettings for this purpose.
1642
1787
  # @param [String] name
1643
1788
  # Required. The name of the SecurityHealthAnalyticsSettings to retrieve. Formats:
1644
1789
  # * organizations/`organization`/securityHealthAnalyticsSettings * folders/`
@@ -1671,7 +1816,13 @@ module Google
1671
1816
  execute_or_queue_command(command, &block)
1672
1817
  end
1673
1818
 
1674
- # Get the VirtualMachineThreatDetectionSettings resource.
1819
+ # Get the VirtualMachineThreatDetectionSettings resource. In the returned
1820
+ # settings response, a missing field only indicates that it was not explicitly
1821
+ # set, so no assumption should be made about these fields. In other words,
1822
+ # GetVirtualMachineThreatDetectionSettings does not calculate the effective
1823
+ # service settings for the resource, which accounts for inherited settings and
1824
+ # defaults. Instead, use CalculateVirtualMachineThreatDetectionSettings for this
1825
+ # purpose.
1675
1826
  # @param [String] name
1676
1827
  # Required. The name of the VirtualMachineThreatDetectionSettings to retrieve.
1677
1828
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -1704,7 +1855,12 @@ module Google
1704
1855
  execute_or_queue_command(command, &block)
1705
1856
  end
1706
1857
 
1707
- # Get the WebSecurityScannerSettings resource.
1858
+ # Get the WebSecurityScannerSettings resource. In the returned settings response,
1859
+ # a missing field only indicates that it was not explicitly set, so no
1860
+ # assumption should be made about these fields. In other words,
1861
+ # GetWebSecurityScannerSettings does not calculate the effective service
1862
+ # settings for the resource, which accounts for inherited settings and defaults.
1863
+ # Instead, use CalculateWebSecurityScannerSettings for this purpose.
1708
1864
  # @param [String] name
1709
1865
  # Required. The name of the WebSecurityScannerSettings to retrieve. Formats: *
1710
1866
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
@@ -1970,7 +2126,12 @@ module Google
1970
2126
  end
1971
2127
 
1972
2128
  # Calculates the effective ContainerThreatDetectionSettings based on its level
1973
- # in the resource hierarchy and its settings.
2129
+ # in the resource hierarchy and its settings. Settings provided closer to the
2130
+ # target resource take precedence over those further away (e.g. folder will
2131
+ # override organization level settings). The default SCC setting for the
2132
+ # detector service defaults can be overridden at organization, folder and
2133
+ # project levels. No assumptions should be made about the SCC defaults as it is
2134
+ # considered an internal implementation detail.
1974
2135
  # @param [String] name
1975
2136
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
1976
2137
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2005,7 +2166,12 @@ module Google
2005
2166
  end
2006
2167
 
2007
2168
  # Calculates the effective EventThreatDetectionSettings based on its level in
2008
- # the resource hierarchy and its settings.
2169
+ # the resource hierarchy and its settings. Settings provided closer to the
2170
+ # target resource take precedence over those further away (e.g. folder will
2171
+ # override organization level settings). The default SCC setting for the
2172
+ # detector service defaults can be overridden at organization, folder and
2173
+ # project levels. No assumptions should be made about the SCC defaults as it is
2174
+ # considered an internal implementation detail.
2009
2175
  # @param [String] name
2010
2176
  # Required. The name of the EventThreatDetectionSettings to calculate. Formats: *
2011
2177
  # organizations/`organization`/eventThreatDetectionSettings * folders/`folder`/
@@ -2037,7 +2203,12 @@ module Google
2037
2203
  execute_or_queue_command(command, &block)
2038
2204
  end
2039
2205
 
2040
- # Get the ContainerThreatDetectionSettings resource.
2206
+ # Get the ContainerThreatDetectionSettings resource. In the returned settings
2207
+ # response, a missing field only indicates that it was not explicitly set, so no
2208
+ # assumption should be made about these fields. In other words,
2209
+ # GetContainerThreatDetectionSettings does not calculate the effective service
2210
+ # settings for the resource, which accounts for inherited settings and defaults.
2211
+ # Instead, use CalculateContainerThreatDetectionSettings for this purpose.
2041
2212
  # @param [String] name
2042
2213
  # Required. The name of the ContainerThreatDetectionSettings to retrieve.
2043
2214
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2112,7 +2283,12 @@ module Google
2112
2283
  end
2113
2284
 
2114
2285
  # Calculates the effective ContainerThreatDetectionSettings based on its level
2115
- # in the resource hierarchy and its settings.
2286
+ # in the resource hierarchy and its settings. Settings provided closer to the
2287
+ # target resource take precedence over those further away (e.g. folder will
2288
+ # override organization level settings). The default SCC setting for the
2289
+ # detector service defaults can be overridden at organization, folder and
2290
+ # project levels. No assumptions should be made about the SCC defaults as it is
2291
+ # considered an internal implementation detail.
2116
2292
  # @param [String] name
2117
2293
  # Required. The name of the ContainerThreatDetectionSettings to calculate.
2118
2294
  # Formats: * organizations/`organization`/containerThreatDetectionSettings *
@@ -2147,7 +2323,12 @@ module Google
2147
2323
  end
2148
2324
 
2149
2325
  # Calculates the effective RapidVulnerabilityDetectionSettings based on its
2150
- # level in the resource hierarchy and its settings.
2326
+ # level in the resource hierarchy and its settings. Settings provided closer to
2327
+ # the target resource take precedence over those further away (e.g. folder will
2328
+ # override organization level settings). The default SCC setting for the
2329
+ # detector service defaults can be overridden at organization, folder and
2330
+ # project levels. No assumptions should be made about the SCC defaults as it is
2331
+ # considered an internal implementation detail.
2151
2332
  # @param [String] name
2152
2333
  # Required. The name of the RapidVulnerabilityDetectionSettings to calculate.
2153
2334
  # Formats: * organizations/`organization`/rapidVulnerabilityDetectionSettings *
@@ -2181,7 +2362,12 @@ module Google
2181
2362
  end
2182
2363
 
2183
2364
  # Calculates the effective SecurityHealthAnalyticsSettings based on its level in
2184
- # the resource hierarchy and its settings.
2365
+ # the resource hierarchy and its settings. Settings provided closer to the
2366
+ # target resource take precedence over those further away (e.g. folder will
2367
+ # override organization level settings). The default SCC setting for the
2368
+ # detector service defaults can be overridden at organization, folder and
2369
+ # project levels. No assumptions should be made about the SCC defaults as it is
2370
+ # considered an internal implementation detail.
2185
2371
  # @param [String] name
2186
2372
  # Required. The name of the SecurityHealthAnalyticsSettings to calculate.
2187
2373
  # Formats: * organizations/`organization`/securityHealthAnalyticsSettings *
@@ -2215,7 +2401,12 @@ module Google
2215
2401
  end
2216
2402
 
2217
2403
  # Calculates the effective VirtualMachineThreatDetectionSettings based on its
2218
- # level in the resource hierarchy and its settings.
2404
+ # level in the resource hierarchy and its settings. Settings provided closer to
2405
+ # the target resource take precedence over those further away (e.g. folder will
2406
+ # override organization level settings). The default SCC setting for the
2407
+ # detector service defaults can be overridden at organization, folder and
2408
+ # project levels. No assumptions should be made about the SCC defaults as it is
2409
+ # considered an internal implementation detail.
2219
2410
  # @param [String] name
2220
2411
  # Required. The name of the VirtualMachineThreatDetectionSettings to calculate.
2221
2412
  # Formats: * organizations/`organization`/virtualMachineThreatDetectionSettings *
@@ -2249,7 +2440,12 @@ module Google
2249
2440
  end
2250
2441
 
2251
2442
  # Calculates the effective WebSecurityScannerSettings based on its level in the
2252
- # resource hierarchy and its settings.
2443
+ # resource hierarchy and its settings. Settings provided closer to the target
2444
+ # resource take precedence over those further away (e.g. folder will override
2445
+ # organization level settings). The default SCC setting for the detector service
2446
+ # defaults can be overridden at organization, folder and project levels. No
2447
+ # assumptions should be made about the SCC defaults as it is considered an
2448
+ # internal implementation detail.
2253
2449
  # @param [String] name
2254
2450
  # Required. The name of the WebSecurityScannerSettings to calculate. Formats: *
2255
2451
  # organizations/`organization`/webSecurityScannerSettings * folders/`folder`/
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-securitycenter_v1beta2
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.40.0
4
+ version: 0.41.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-11-14 00:00:00.000000000 Z
11
+ date: 2022-12-12 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-securitycenter_v1beta2/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta2/v0.40.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta2/v0.41.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-securitycenter_v1beta2
63
63
  post_install_message:
64
64
  rdoc_options: []