google-apis-threatintelligence_v1beta 0.5.0 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 61cca9462ea78c4ce0e83a077d01b2584e11930d43d33485373a5edec30ecb87
4
- data.tar.gz: b3461109175541a840ce12d7c95f4be4cde1cc642da923d1468c99e1d846f7d4
3
+ metadata.gz: 2d87d0415b3f6632d1b12d24343a7a4693c4c0587bdb12a407e1dd5ecbd9e6a9
4
+ data.tar.gz: 4b0ab30e3db8ed5da031aa120a42b901b6074c35a4ee8c915dd85e114a9151e4
5
5
  SHA512:
6
- metadata.gz: 78a0d5865d9b2a2f2d80cab8a544e216009800b05227600b0b41a79e8958ac320d6ec9c5372a90f6c2f4350a9b253e7e4c58e93b4ee843713805f72218594447
7
- data.tar.gz: de1eb95adeb0baf6372173c1ebac7123fa4dda946a1cecba939fd9b59906002fd463515110c99918439f1c0eeb45e467cc5f1b5b67b5759ef63baac596113263
6
+ metadata.gz: f6b9b4ca3ab7b303a3165e4c15354abc2b402b85d515a0cb8e3e34f4d09c1774f86174ef8ad6f18aabc8b16cfab3788cd6c0ea16ab3c2162532029d659054cb7
7
+ data.tar.gz: d5176aef97cd07e43e43e462a0d8d7a8bb8805ec029d156879ccaf645b10a6a076d4070e4f4fa92e1450c57f0aae9f48b01dfbdd983a104d6778434412e1f4f7
data/CHANGELOG.md CHANGED
@@ -1,5 +1,13 @@
1
1
  # Release history for google-apis-threatintelligence_v1beta
2
2
 
3
+ ### v0.7.0 (2026-04-19)
4
+
5
+ * Regenerated from discovery document revision 20260412
6
+
7
+ ### v0.6.0 (2026-03-08)
8
+
9
+ * Regenerated from discovery document revision 20260223
10
+
3
11
  ### v0.5.0 (2026-02-22)
4
12
 
5
13
  * Regenerated from discovery document revision 20260218
@@ -961,9 +961,8 @@ module Google
961
961
  # @return [Array<String>]
962
962
  attr_accessor :discovery_document_ids
963
963
 
964
- # Required. Data Leak specific severity This will be the string representation
965
- # of the DataLeakFindingDetail.Severityenum. (e.g., "LOW", "MEDIUM", "HIGH", "
966
- # CRITICAL")
964
+ # Required. The severity of the Data Leak alert. Allowed values are: * `LOW` * `
965
+ # MEDIUM` * `HIGH` * `CRITICAL`
967
966
  # Corresponds to the JSON property `severity`
968
967
  # @return [String]
969
968
  attr_accessor :severity
@@ -1307,7 +1306,8 @@ module Google
1307
1306
  # @return [Array<String>]
1308
1307
  attr_accessor :discovery_document_ids
1309
1308
 
1310
- # Required. IAB specific severity
1309
+ # Required. The severity of the Initial Access Broker (IAB) alert. Allowed
1310
+ # values are: * `LOW` * `MEDIUM` * `HIGH` * `CRITICAL`
1311
1311
  # Corresponds to the JSON property `severity`
1312
1312
  # @return [String]
1313
1313
  attr_accessor :severity
@@ -1368,9 +1368,8 @@ module Google
1368
1368
  # @return [Array<String>]
1369
1369
  attr_accessor :discovery_document_ids
1370
1370
 
1371
- # Required. InsiderThreat specific severity This will be the string
1372
- # representation of the InsiderThreatFindingDetail.Severityenum. (e.g., "LOW", "
1373
- # MEDIUM", "HIGH", "CRITICAL")
1371
+ # Required. The severity of the Insider Threat alert. Allowed values are: * `LOW`
1372
+ # * `MEDIUM` * `HIGH` * `CRITICAL`
1374
1373
  # Corresponds to the JSON property `severity`
1375
1374
  # @return [String]
1376
1375
  attr_accessor :severity
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module ThreatintelligenceV1beta
18
18
  # Version of the google-apis-threatintelligence_v1beta gem
19
- GEM_VERSION = "0.5.0"
19
+ GEM_VERSION = "0.7.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.18.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20260218"
25
+ REVISION = "20260412"
26
26
  end
27
27
  end
28
28
  end
@@ -289,14 +289,31 @@ module Google
289
289
  # @param [String] parent
290
290
  # Required. Parent of the alerts. Format: projects/`project`
291
291
  # @param [String] filter
292
- # Optional. Filter criteria.
292
+ # Optional. Filter criteria. Supported fields for filtering include: * `audit.
293
+ # create_time` * `audit.creator` * `audit.update_time` * `audit.updater` * `
294
+ # detail.data_leak.discovery_document_ids` * `detail.data_leak.severity` * `
295
+ # detail.detail_type` * `detail.initial_access_broker.discovery_document_ids` * `
296
+ # detail.initial_access_broker.severity` * `detail.insider_threat.
297
+ # discovery_document_ids` * `detail.insider_threat.severity` * `finding_count` *
298
+ # `priority_analysis.priority_level` * `relevance_analysis.confidence` * `
299
+ # relevance_analysis.relevance_level` * `relevance_analysis.relevant` * `
300
+ # severity_analysis.severity_level` * `state` Examples: * `detail.detail_type = "
301
+ # initial_access_broker"` * `detail.detail_type != "data_leak"` * `detail.
302
+ # insider_threat.severity = "HIGH"` * `audit.create_time >= "2026-04-03T00:00:
303
+ # 00Z" AND audit.create_time < "2026-04-06T00:00:00Z"` * `state = "NEW" OR state
304
+ # = "TRIAGED"` * `severity_analysis.severity_level = "SEVERITY_LEVEL_CRITICAL"`
293
305
  # @param [String] order_by
294
- # Optional. Order by criteria in the csv format: "field1,field2 desc" or "field1,
295
- # field2" or "field1 asc, field2".
306
+ # Optional. Order by criteria in the csv format: "field1, field2 desc" or "
307
+ # field1, field2" or "field1 asc, field2". If a field is specified without `asc`
308
+ # or `desc`, ascending order is used by default. Supported fields for ordering
309
+ # are identical to those supported for filtering. Examples: * `audit.create_time
310
+ # desc` * `audit.update_time asc` * `audit.create_time desc, severity_analysis.
311
+ # severity_level desc`
296
312
  # @param [Fixnum] page_size
297
- # Optional. Page size.
313
+ # Optional. Page size. Default to 100 alerts per page. Maximum is 1000 alerts
314
+ # per page.
298
315
  # @param [String] page_token
299
- # Optional. Page token.
316
+ # Optional. Page token to retrieve the next page of results.
300
317
  # @param [String] fields
301
318
  # Selector specifying which fields to include in a partial response.
302
319
  # @param [String] quota_user
@@ -684,7 +701,8 @@ module Google
684
701
  execute_or_queue_command(command, &block)
685
702
  end
686
703
 
687
- # Get a finding by name.
704
+ # Get a finding by name. The `name` field should have the format: `projects/`
705
+ # project`/findings/`finding``
688
706
  # @param [String] name
689
707
  # Required. Name of the finding to get.
690
708
  # @param [String] fields
@@ -714,7 +732,8 @@ module Google
714
732
  execute_or_queue_command(command, &block)
715
733
  end
716
734
 
717
- # Get a list of findings that meet the filter criteria.
735
+ # Get a list of findings that meet the filter criteria. The `parent` field in
736
+ # ListFindingsRequest should have the format: projects/`project`
718
737
  # @param [String] parent
719
738
  # Required. Parent of the findings.
720
739
  # @param [String] filter
@@ -758,9 +777,10 @@ module Google
758
777
  end
759
778
 
760
779
  # SearchFindings is a more powerful version of ListFindings that supports
761
- # complex queries like "findings for issues" using functions such as `has_issue`
762
- # and `has_asset` in the query string. Example to search for findings for a
763
- # specific issue: `has_issue("name=\"vaults/vault-12345/issues/issue-12345\"")`)
780
+ # complex queries like "findings for alerts" using functions such as `has_alert`
781
+ # in the query string. The `parent` field in SearchFindingsRequest should have
782
+ # the format: projects/`project` Example to search for findings for a specific
783
+ # issue: `has_alert("name=\"projects/gti-12345/alerts/alert-12345\"")`
764
784
  # @param [String] parent
765
785
  # Required. Parent of the findings. Format: vaults/`vault`
766
786
  # @param [String] order_by
@@ -773,9 +793,8 @@ module Google
773
793
  # @param [String] query
774
794
  # Optional. Query on what findings will be returned. This supports the same
775
795
  # filter criteria as FindingService.ListFindings as well as the following
776
- # relationship queries `has_issue` and `has_asset`. Examples: - has_issue("name=\
777
- # "vaults/vault-12345/issues/issue-12345\"") - has_asset("name=\"vaults/vault-
778
- # 12345/assets/asset-12345\"")
796
+ # relationship query `has_alert`. Example: - `has_alert("name=\"projects/gti-
797
+ # 12345/alerts/alert-12345\"")`
779
798
  # @param [String] fields
780
799
  # Selector specifying which fields to include in a partial response.
781
800
  # @param [String] quota_user
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-threatintelligence_v1beta
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.0
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
@@ -57,7 +57,7 @@ licenses:
57
57
  metadata:
58
58
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
59
59
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-threatintelligence_v1beta/CHANGELOG.md
60
- documentation_uri: https://googleapis.dev/ruby/google-apis-threatintelligence_v1beta/v0.5.0
60
+ documentation_uri: https://googleapis.dev/ruby/google-apis-threatintelligence_v1beta/v0.7.0
61
61
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-threatintelligence_v1beta
62
62
  rdoc_options: []
63
63
  require_paths: