google-cloud-security_center-v1 0.8.1 → 0.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/security_center/v1/version.rb +1 -1
- data/lib/google/cloud/securitycenter/v1/asset_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/finding_pb.rb +4 -2
- data/lib/google/cloud/securitycenter/v1/folder_pb.rb +1 -1
- data/lib/google/cloud/securitycenter/v1/indicator_pb.rb +1 -1
- data/lib/google/cloud/securitycenter/v1/notification_config_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/notification_message_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/organization_settings_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/resource_pb.rb +3 -2
- data/lib/google/cloud/securitycenter/v1/run_asset_discovery_response_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/security_marks_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/securitycenter_service_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/securitycenter_service_services_pb.rb +1 -1
- data/lib/google/cloud/securitycenter/v1/source_pb.rb +2 -2
- data/lib/google/cloud/securitycenter/v1/vulnerability_pb.rb +86 -0
- data/proto_docs/google/cloud/securitycenter/v1/finding.rb +5 -0
- data/proto_docs/google/cloud/securitycenter/v1/resource.rb +3 -0
- data/proto_docs/google/cloud/securitycenter/v1/vulnerability.rb +226 -0
- metadata +4 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 9544668b93bf62b6a525f12c79213f71ad4113073505bdec57fea1ed5a10643e
|
4
|
+
data.tar.gz: 71f8ec0fef19f6a77ad40a3070c60d26ac68d176a57c6d005275ca811863a4f1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ba5853c6fdca6c247026b6fb1f0e86c784a5af98cea06a66582ff0f5fa4791da81412096ee18908e95424cd5c97f46f74446f2a12b08475570682dc34dea0b9a
|
7
|
+
data.tar.gz: 9d3652bc7ed972de2162d364970a35fbba0d93e44bf30492f40bc4912a1db6d886e212c09bdbfd02e590fe5e8ddb77e9abbab6fcd441897631a40babfb67ec72
|
@@ -1,14 +1,14 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/asset.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/resource_pb'
|
7
5
|
require 'google/cloud/securitycenter/v1/folder_pb'
|
8
6
|
require 'google/cloud/securitycenter/v1/security_marks_pb'
|
9
7
|
require 'google/protobuf/struct_pb'
|
10
8
|
require 'google/protobuf/timestamp_pb'
|
11
9
|
require 'google/api/annotations_pb'
|
10
|
+
require 'google/protobuf'
|
11
|
+
|
12
12
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
13
13
|
add_file("google/cloud/securitycenter/v1/asset.proto", :syntax => :proto3) do
|
14
14
|
add_message "google.cloud.securitycenter.v1.Asset" do
|
@@ -1,15 +1,16 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/finding.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/field_behavior_pb'
|
7
5
|
require 'google/api/resource_pb'
|
8
6
|
require 'google/cloud/securitycenter/v1/indicator_pb'
|
9
7
|
require 'google/cloud/securitycenter/v1/security_marks_pb'
|
8
|
+
require 'google/cloud/securitycenter/v1/vulnerability_pb'
|
10
9
|
require 'google/protobuf/struct_pb'
|
11
10
|
require 'google/protobuf/timestamp_pb'
|
12
11
|
require 'google/api/annotations_pb'
|
12
|
+
require 'google/protobuf'
|
13
|
+
|
13
14
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
14
15
|
add_file("google/cloud/securitycenter/v1/finding.proto", :syntax => :proto3) do
|
15
16
|
add_message "google.cloud.securitycenter.v1.Finding" do
|
@@ -27,6 +28,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
27
28
|
optional :canonical_name, :string, 14
|
28
29
|
optional :finding_class, :enum, 17, "google.cloud.securitycenter.v1.Finding.FindingClass"
|
29
30
|
optional :indicator, :message, 18, "google.cloud.securitycenter.v1.Indicator"
|
31
|
+
optional :vulnerability, :message, 20, "google.cloud.securitycenter.v1.Vulnerability"
|
30
32
|
end
|
31
33
|
add_enum "google.cloud.securitycenter.v1.Finding.State" do
|
32
34
|
value :STATE_UNSPECIFIED, 0
|
@@ -1,9 +1,9 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/folder.proto
|
3
3
|
|
4
|
+
require 'google/api/annotations_pb'
|
4
5
|
require 'google/protobuf'
|
5
6
|
|
6
|
-
require 'google/api/annotations_pb'
|
7
7
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
8
8
|
add_file("google/cloud/securitycenter/v1/folder.proto", :syntax => :proto3) do
|
9
9
|
add_message "google.cloud.securitycenter.v1.Folder" do
|
@@ -1,9 +1,9 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/indicator.proto
|
3
3
|
|
4
|
+
require 'google/api/annotations_pb'
|
4
5
|
require 'google/protobuf'
|
5
6
|
|
6
|
-
require 'google/api/annotations_pb'
|
7
7
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
8
8
|
add_file("google/cloud/securitycenter/v1/indicator.proto", :syntax => :proto3) do
|
9
9
|
add_message "google.cloud.securitycenter.v1.Indicator" do
|
@@ -1,11 +1,11 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/notification_config.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/field_behavior_pb'
|
7
5
|
require 'google/api/resource_pb'
|
8
6
|
require 'google/api/annotations_pb'
|
7
|
+
require 'google/protobuf'
|
8
|
+
|
9
9
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
10
10
|
add_file("google/cloud/securitycenter/v1/notification_config.proto", :syntax => :proto3) do
|
11
11
|
add_message "google.cloud.securitycenter.v1.NotificationConfig" do
|
@@ -1,11 +1,11 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/notification_message.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/cloud/securitycenter/v1/finding_pb'
|
7
5
|
require 'google/cloud/securitycenter/v1/resource_pb'
|
8
6
|
require 'google/api/annotations_pb'
|
7
|
+
require 'google/protobuf'
|
8
|
+
|
9
9
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
10
10
|
add_file("google/cloud/securitycenter/v1/notification_message.proto", :syntax => :proto3) do
|
11
11
|
add_message "google.cloud.securitycenter.v1.NotificationMessage" do
|
@@ -1,10 +1,10 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/organization_settings.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/resource_pb'
|
7
5
|
require 'google/api/annotations_pb'
|
6
|
+
require 'google/protobuf'
|
7
|
+
|
8
8
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
9
9
|
add_file("google/cloud/securitycenter/v1/organization_settings.proto", :syntax => :proto3) do
|
10
10
|
add_message "google.cloud.securitycenter.v1.OrganizationSettings" do
|
@@ -1,11 +1,11 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/resource.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/field_behavior_pb'
|
7
5
|
require 'google/cloud/securitycenter/v1/folder_pb'
|
8
6
|
require 'google/api/annotations_pb'
|
7
|
+
require 'google/protobuf'
|
8
|
+
|
9
9
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
10
10
|
add_file("google/cloud/securitycenter/v1/resource.proto", :syntax => :proto3) do
|
11
11
|
add_message "google.cloud.securitycenter.v1.Resource" do
|
@@ -14,6 +14,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
14
14
|
optional :project_display_name, :string, 3
|
15
15
|
optional :parent, :string, 4
|
16
16
|
optional :parent_display_name, :string, 5
|
17
|
+
optional :type, :string, 6
|
17
18
|
repeated :folders, :message, 7, "google.cloud.securitycenter.v1.Folder"
|
18
19
|
end
|
19
20
|
end
|
@@ -1,10 +1,10 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/run_asset_discovery_response.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/protobuf/duration_pb'
|
7
5
|
require 'google/api/annotations_pb'
|
6
|
+
require 'google/protobuf'
|
7
|
+
|
8
8
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
9
9
|
add_file("google/cloud/securitycenter/v1/run_asset_discovery_response.proto", :syntax => :proto3) do
|
10
10
|
add_message "google.cloud.securitycenter.v1.RunAssetDiscoveryResponse" do
|
@@ -1,10 +1,10 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/security_marks.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/resource_pb'
|
7
5
|
require 'google/api/annotations_pb'
|
6
|
+
require 'google/protobuf'
|
7
|
+
|
8
8
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
9
9
|
add_file("google/cloud/securitycenter/v1/security_marks.proto", :syntax => :proto3) do
|
10
10
|
add_message "google.cloud.securitycenter.v1.SecurityMarks" do
|
@@ -1,8 +1,6 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/securitycenter_service.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/cloud/securitycenter/v1/run_asset_discovery_response_pb'
|
7
5
|
require 'google/api/annotations_pb'
|
8
6
|
require 'google/api/client_pb'
|
@@ -23,6 +21,8 @@ require 'google/protobuf/empty_pb'
|
|
23
21
|
require 'google/protobuf/field_mask_pb'
|
24
22
|
require 'google/protobuf/struct_pb'
|
25
23
|
require 'google/protobuf/timestamp_pb'
|
24
|
+
require 'google/protobuf'
|
25
|
+
|
26
26
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
27
27
|
add_file("google/cloud/securitycenter/v1/securitycenter_service.proto", :syntax => :proto3) do
|
28
28
|
add_message "google.cloud.securitycenter.v1.CreateFindingRequest" do
|
@@ -1,10 +1,10 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# source: google/cloud/securitycenter/v1/source.proto
|
3
3
|
|
4
|
-
require 'google/protobuf'
|
5
|
-
|
6
4
|
require 'google/api/resource_pb'
|
7
5
|
require 'google/api/annotations_pb'
|
6
|
+
require 'google/protobuf'
|
7
|
+
|
8
8
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
9
9
|
add_file("google/cloud/securitycenter/v1/source.proto", :syntax => :proto3) do
|
10
10
|
add_message "google.cloud.securitycenter.v1.Source" do
|
@@ -0,0 +1,86 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/cloud/securitycenter/v1/vulnerability.proto
|
3
|
+
|
4
|
+
require 'google/api/annotations_pb'
|
5
|
+
require 'google/protobuf'
|
6
|
+
|
7
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
8
|
+
add_file("google/cloud/securitycenter/v1/vulnerability.proto", :syntax => :proto3) do
|
9
|
+
add_message "google.cloud.securitycenter.v1.Vulnerability" do
|
10
|
+
optional :cve, :message, 1, "google.cloud.securitycenter.v1.Cve"
|
11
|
+
end
|
12
|
+
add_message "google.cloud.securitycenter.v1.Cve" do
|
13
|
+
optional :id, :string, 1
|
14
|
+
repeated :references, :message, 2, "google.cloud.securitycenter.v1.Reference"
|
15
|
+
optional :cvssv3, :message, 3, "google.cloud.securitycenter.v1.Cvssv3"
|
16
|
+
end
|
17
|
+
add_message "google.cloud.securitycenter.v1.Reference" do
|
18
|
+
optional :source, :string, 1
|
19
|
+
optional :uri, :string, 2
|
20
|
+
end
|
21
|
+
add_message "google.cloud.securitycenter.v1.Cvssv3" do
|
22
|
+
optional :base_score, :double, 1
|
23
|
+
optional :attack_vector, :enum, 5, "google.cloud.securitycenter.v1.Cvssv3.AttackVector"
|
24
|
+
optional :attack_complexity, :enum, 6, "google.cloud.securitycenter.v1.Cvssv3.AttackComplexity"
|
25
|
+
optional :privileges_required, :enum, 7, "google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired"
|
26
|
+
optional :user_interaction, :enum, 8, "google.cloud.securitycenter.v1.Cvssv3.UserInteraction"
|
27
|
+
optional :scope, :enum, 9, "google.cloud.securitycenter.v1.Cvssv3.Scope"
|
28
|
+
optional :confidentiality_impact, :enum, 10, "google.cloud.securitycenter.v1.Cvssv3.Impact"
|
29
|
+
optional :integrity_impact, :enum, 11, "google.cloud.securitycenter.v1.Cvssv3.Impact"
|
30
|
+
optional :availability_impact, :enum, 12, "google.cloud.securitycenter.v1.Cvssv3.Impact"
|
31
|
+
end
|
32
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.AttackVector" do
|
33
|
+
value :ATTACK_VECTOR_UNSPECIFIED, 0
|
34
|
+
value :ATTACK_VECTOR_NETWORK, 1
|
35
|
+
value :ATTACK_VECTOR_ADJACENT, 2
|
36
|
+
value :ATTACK_VECTOR_LOCAL, 3
|
37
|
+
value :ATTACK_VECTOR_PHYSICAL, 4
|
38
|
+
end
|
39
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.AttackComplexity" do
|
40
|
+
value :ATTACK_COMPLEXITY_UNSPECIFIED, 0
|
41
|
+
value :ATTACK_COMPLEXITY_LOW, 1
|
42
|
+
value :ATTACK_COMPLEXITY_HIGH, 2
|
43
|
+
end
|
44
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired" do
|
45
|
+
value :PRIVILEGES_REQUIRED_UNSPECIFIED, 0
|
46
|
+
value :PRIVILEGES_REQUIRED_NONE, 1
|
47
|
+
value :PRIVILEGES_REQUIRED_LOW, 2
|
48
|
+
value :PRIVILEGES_REQUIRED_HIGH, 3
|
49
|
+
end
|
50
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.UserInteraction" do
|
51
|
+
value :USER_INTERACTION_UNSPECIFIED, 0
|
52
|
+
value :USER_INTERACTION_NONE, 1
|
53
|
+
value :USER_INTERACTION_REQUIRED, 2
|
54
|
+
end
|
55
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.Scope" do
|
56
|
+
value :SCOPE_UNSPECIFIED, 0
|
57
|
+
value :SCOPE_UNCHANGED, 1
|
58
|
+
value :SCOPE_CHANGED, 2
|
59
|
+
end
|
60
|
+
add_enum "google.cloud.securitycenter.v1.Cvssv3.Impact" do
|
61
|
+
value :IMPACT_UNSPECIFIED, 0
|
62
|
+
value :IMPACT_HIGH, 1
|
63
|
+
value :IMPACT_LOW, 2
|
64
|
+
value :IMPACT_NONE, 3
|
65
|
+
end
|
66
|
+
end
|
67
|
+
end
|
68
|
+
|
69
|
+
module Google
|
70
|
+
module Cloud
|
71
|
+
module SecurityCenter
|
72
|
+
module V1
|
73
|
+
Vulnerability = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Vulnerability").msgclass
|
74
|
+
Cve = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cve").msgclass
|
75
|
+
Reference = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Reference").msgclass
|
76
|
+
Cvssv3 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3").msgclass
|
77
|
+
Cvssv3::AttackVector = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.AttackVector").enummodule
|
78
|
+
Cvssv3::AttackComplexity = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.AttackComplexity").enummodule
|
79
|
+
Cvssv3::PrivilegesRequired = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired").enummodule
|
80
|
+
Cvssv3::UserInteraction = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.UserInteraction").enummodule
|
81
|
+
Cvssv3::Scope = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.Scope").enummodule
|
82
|
+
Cvssv3::Impact = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.Impact").enummodule
|
83
|
+
end
|
84
|
+
end
|
85
|
+
end
|
86
|
+
end
|
@@ -106,6 +106,11 @@ module Google
|
|
106
106
|
# operating system that, with high confidence, indicates a computer
|
107
107
|
# intrusion.
|
108
108
|
# Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
|
109
|
+
# @!attribute [rw] vulnerability
|
110
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Vulnerability]
|
111
|
+
# Represents vulnerability specific fields like cve, cvss scores etc.
|
112
|
+
# CVE stands for Common Vulnerabilities and Exposures
|
113
|
+
# (https://cve.mitre.org/about/)
|
109
114
|
class Finding
|
110
115
|
include ::Google::Protobuf::MessageExts
|
111
116
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -38,6 +38,9 @@ module Google
|
|
38
38
|
# @!attribute [rw] parent_display_name
|
39
39
|
# @return [::String]
|
40
40
|
# The human readable name of resource's parent.
|
41
|
+
# @!attribute [rw] type
|
42
|
+
# @return [::String]
|
43
|
+
# The full resource type of the resource.
|
41
44
|
# @!attribute [r] folders
|
42
45
|
# @return [::Array<::Google::Cloud::SecurityCenter::V1::Folder>]
|
43
46
|
# Output only. Contains a Folder message for each folder in the assets ancestry.
|
@@ -0,0 +1,226 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Cloud
|
22
|
+
module SecurityCenter
|
23
|
+
module V1
|
24
|
+
# Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
|
25
|
+
# @!attribute [rw] cve
|
26
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cve]
|
27
|
+
# CVE stands for Common Vulnerabilities and Exposures
|
28
|
+
# (https://cve.mitre.org/about/)
|
29
|
+
class Vulnerability
|
30
|
+
include ::Google::Protobuf::MessageExts
|
31
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
32
|
+
end
|
33
|
+
|
34
|
+
# CVE stands for Common Vulnerabilities and Exposures.
|
35
|
+
# More information: https://cve.mitre.org
|
36
|
+
# @!attribute [rw] id
|
37
|
+
# @return [::String]
|
38
|
+
# The unique identifier for the vulnerability. e.g. CVE-2021-34527
|
39
|
+
# @!attribute [rw] references
|
40
|
+
# @return [::Array<::Google::Cloud::SecurityCenter::V1::Reference>]
|
41
|
+
# Additional information about the CVE.
|
42
|
+
# e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
|
43
|
+
# @!attribute [rw] cvssv3
|
44
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3]
|
45
|
+
# Describe Common Vulnerability Scoring System specified at
|
46
|
+
# https://www.first.org/cvss/v3.1/specification-document
|
47
|
+
class Cve
|
48
|
+
include ::Google::Protobuf::MessageExts
|
49
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
50
|
+
end
|
51
|
+
|
52
|
+
# Additional Links
|
53
|
+
# @!attribute [rw] source
|
54
|
+
# @return [::String]
|
55
|
+
# Source of the reference e.g. NVD
|
56
|
+
# @!attribute [rw] uri
|
57
|
+
# @return [::String]
|
58
|
+
# Uri for the mentioned source e.g.
|
59
|
+
# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
|
60
|
+
class Reference
|
61
|
+
include ::Google::Protobuf::MessageExts
|
62
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
63
|
+
end
|
64
|
+
|
65
|
+
# Common Vulnerability Scoring System version 3.
|
66
|
+
# @!attribute [rw] base_score
|
67
|
+
# @return [::Float]
|
68
|
+
# The base score is a function of the base metric scores.
|
69
|
+
# @!attribute [rw] attack_vector
|
70
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackVector]
|
71
|
+
# Base Metrics
|
72
|
+
# Represents the intrinsic characteristics of a vulnerability that are
|
73
|
+
# constant over time and across user environments.
|
74
|
+
# This metric reflects the context by which vulnerability exploitation is
|
75
|
+
# possible.
|
76
|
+
# @!attribute [rw] attack_complexity
|
77
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackComplexity]
|
78
|
+
# This metric describes the conditions beyond the attacker's control that
|
79
|
+
# must exist in order to exploit the vulnerability.
|
80
|
+
# @!attribute [rw] privileges_required
|
81
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::PrivilegesRequired]
|
82
|
+
# This metric describes the level of privileges an attacker must possess
|
83
|
+
# before successfully exploiting the vulnerability.
|
84
|
+
# @!attribute [rw] user_interaction
|
85
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::UserInteraction]
|
86
|
+
# This metric captures the requirement for a human user, other than the
|
87
|
+
# attacker, to participate in the successful compromise of the vulnerable
|
88
|
+
# component.
|
89
|
+
# @!attribute [rw] scope
|
90
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Scope]
|
91
|
+
# The Scope metric captures whether a vulnerability in one vulnerable
|
92
|
+
# component impacts resources in components beyond its security scope.
|
93
|
+
# @!attribute [rw] confidentiality_impact
|
94
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
|
95
|
+
# This metric measures the impact to the confidentiality of the information
|
96
|
+
# resources managed by a software component due to a successfully exploited
|
97
|
+
# vulnerability.
|
98
|
+
# @!attribute [rw] integrity_impact
|
99
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
|
100
|
+
# This metric measures the impact to integrity of a successfully exploited
|
101
|
+
# vulnerability.
|
102
|
+
# @!attribute [rw] availability_impact
|
103
|
+
# @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
|
104
|
+
# This metric measures the impact to the availability of the impacted
|
105
|
+
# component resulting from a successfully exploited vulnerability.
|
106
|
+
class Cvssv3
|
107
|
+
include ::Google::Protobuf::MessageExts
|
108
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
109
|
+
|
110
|
+
# This metric reflects the context by which vulnerability exploitation is
|
111
|
+
# possible.
|
112
|
+
module AttackVector
|
113
|
+
# Invalid value.
|
114
|
+
ATTACK_VECTOR_UNSPECIFIED = 0
|
115
|
+
|
116
|
+
# The vulnerable component is bound to the network stack and the set of
|
117
|
+
# possible attackers extends beyond the other options listed below, up to
|
118
|
+
# and including the entire Internet.
|
119
|
+
ATTACK_VECTOR_NETWORK = 1
|
120
|
+
|
121
|
+
# The vulnerable component is bound to the network stack, but the attack is
|
122
|
+
# limited at the protocol level to a logically adjacent topology.
|
123
|
+
ATTACK_VECTOR_ADJACENT = 2
|
124
|
+
|
125
|
+
# The vulnerable component is not bound to the network stack and the
|
126
|
+
# attacker's path is via read/write/execute capabilities.
|
127
|
+
ATTACK_VECTOR_LOCAL = 3
|
128
|
+
|
129
|
+
# The attack requires the attacker to physically touch or manipulate the
|
130
|
+
# vulnerable component.
|
131
|
+
ATTACK_VECTOR_PHYSICAL = 4
|
132
|
+
end
|
133
|
+
|
134
|
+
# This metric describes the conditions beyond the attacker's control that
|
135
|
+
# must exist in order to exploit the vulnerability.
|
136
|
+
module AttackComplexity
|
137
|
+
# Invalid value.
|
138
|
+
ATTACK_COMPLEXITY_UNSPECIFIED = 0
|
139
|
+
|
140
|
+
# Specialized access conditions or extenuating circumstances do not exist.
|
141
|
+
# An attacker can expect repeatable success when attacking the vulnerable
|
142
|
+
# component.
|
143
|
+
ATTACK_COMPLEXITY_LOW = 1
|
144
|
+
|
145
|
+
# A successful attack depends on conditions beyond the attacker's control.
|
146
|
+
# That is, a successful attack cannot be accomplished at will, but requires
|
147
|
+
# the attacker to invest in some measurable amount of effort in preparation
|
148
|
+
# or execution against the vulnerable component before a successful attack
|
149
|
+
# can be expected.
|
150
|
+
ATTACK_COMPLEXITY_HIGH = 2
|
151
|
+
end
|
152
|
+
|
153
|
+
# This metric describes the level of privileges an attacker must possess
|
154
|
+
# before successfully exploiting the vulnerability.
|
155
|
+
module PrivilegesRequired
|
156
|
+
# Invalid value.
|
157
|
+
PRIVILEGES_REQUIRED_UNSPECIFIED = 0
|
158
|
+
|
159
|
+
# The attacker is unauthorized prior to attack, and therefore does not
|
160
|
+
# require any access to settings or files of the vulnerable system to
|
161
|
+
# carry out an attack.
|
162
|
+
PRIVILEGES_REQUIRED_NONE = 1
|
163
|
+
|
164
|
+
# The attacker requires privileges that provide basic user capabilities
|
165
|
+
# that could normally affect only settings and files owned by a user.
|
166
|
+
# Alternatively, an attacker with Low privileges has the ability to access
|
167
|
+
# only non-sensitive resources.
|
168
|
+
PRIVILEGES_REQUIRED_LOW = 2
|
169
|
+
|
170
|
+
# The attacker requires privileges that provide significant (e.g.,
|
171
|
+
# administrative) control over the vulnerable component allowing access to
|
172
|
+
# component-wide settings and files.
|
173
|
+
PRIVILEGES_REQUIRED_HIGH = 3
|
174
|
+
end
|
175
|
+
|
176
|
+
# This metric captures the requirement for a human user, other than the
|
177
|
+
# attacker, to participate in the successful compromise of the vulnerable
|
178
|
+
# component.
|
179
|
+
module UserInteraction
|
180
|
+
# Invalid value.
|
181
|
+
USER_INTERACTION_UNSPECIFIED = 0
|
182
|
+
|
183
|
+
# The vulnerable system can be exploited without interaction from any user.
|
184
|
+
USER_INTERACTION_NONE = 1
|
185
|
+
|
186
|
+
# Successful exploitation of this vulnerability requires a user to take
|
187
|
+
# some action before the vulnerability can be exploited.
|
188
|
+
USER_INTERACTION_REQUIRED = 2
|
189
|
+
end
|
190
|
+
|
191
|
+
# The Scope metric captures whether a vulnerability in one vulnerable
|
192
|
+
# component impacts resources in components beyond its security scope.
|
193
|
+
module Scope
|
194
|
+
# Invalid value.
|
195
|
+
SCOPE_UNSPECIFIED = 0
|
196
|
+
|
197
|
+
# An exploited vulnerability can only affect resources managed by the same
|
198
|
+
# security authority.
|
199
|
+
SCOPE_UNCHANGED = 1
|
200
|
+
|
201
|
+
# An exploited vulnerability can affect resources beyond the security scope
|
202
|
+
# managed by the security authority of the vulnerable component.
|
203
|
+
SCOPE_CHANGED = 2
|
204
|
+
end
|
205
|
+
|
206
|
+
# The Impact metrics capture the effects of a successfully exploited
|
207
|
+
# vulnerability on the component that suffers the worst outcome that is most
|
208
|
+
# directly and predictably associated with the attack.
|
209
|
+
module Impact
|
210
|
+
# Invalid value.
|
211
|
+
IMPACT_UNSPECIFIED = 0
|
212
|
+
|
213
|
+
# High impact.
|
214
|
+
IMPACT_HIGH = 1
|
215
|
+
|
216
|
+
# Low impact.
|
217
|
+
IMPACT_LOW = 2
|
218
|
+
|
219
|
+
# No impact.
|
220
|
+
IMPACT_NONE = 3
|
221
|
+
end
|
222
|
+
end
|
223
|
+
end
|
224
|
+
end
|
225
|
+
end
|
226
|
+
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-security_center-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.9.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-10-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|
@@ -210,6 +210,7 @@ files:
|
|
210
210
|
- lib/google/cloud/securitycenter/v1/securitycenter_service_pb.rb
|
211
211
|
- lib/google/cloud/securitycenter/v1/securitycenter_service_services_pb.rb
|
212
212
|
- lib/google/cloud/securitycenter/v1/source_pb.rb
|
213
|
+
- lib/google/cloud/securitycenter/v1/vulnerability_pb.rb
|
213
214
|
- proto_docs/README.md
|
214
215
|
- proto_docs/google/api/field_behavior.rb
|
215
216
|
- proto_docs/google/api/resource.rb
|
@@ -225,6 +226,7 @@ files:
|
|
225
226
|
- proto_docs/google/cloud/securitycenter/v1/security_marks.rb
|
226
227
|
- proto_docs/google/cloud/securitycenter/v1/securitycenter_service.rb
|
227
228
|
- proto_docs/google/cloud/securitycenter/v1/source.rb
|
229
|
+
- proto_docs/google/cloud/securitycenter/v1/vulnerability.rb
|
228
230
|
- proto_docs/google/iam/v1/iam_policy.rb
|
229
231
|
- proto_docs/google/iam/v1/options.rb
|
230
232
|
- proto_docs/google/iam/v1/policy.rb
|