google-cloud-security_center-v1 1.1.0 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 055d414ad671f290e4358df978ab7642242beb7261499fa1ce16e057668bd12a
|
4
|
+
data.tar.gz: 7c884df91a6817edd4a81465c928fc73500aac3a9643ce4d388f9774b07dd58e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 872260165f6fb0c7a8ba60e3950f400a8a693f98e7586f11d2cc960548d1ddb79bbc280d1a4ac71aa675e9ff52fa6066373fec5e077bae6c72a38eb8c3821d0e
|
7
|
+
data.tar.gz: 4b95eeb39e191b2d06352a97ab231b80926fad147b9192a5793b05676193605a3e2bd1e2b098ce609d2f440cb1a46ed2ebcd8338a09c3d2b30f7630abfa7282e
|
@@ -120,47 +120,47 @@ module Google
|
|
120
120
|
##
|
121
121
|
# Create a fully-qualified EffectiveEventThreatDetectionCustomModule resource string.
|
122
122
|
#
|
123
|
-
# @overload effective_event_threat_detection_custom_module_path(organization:,
|
123
|
+
# @overload effective_event_threat_detection_custom_module_path(organization:, module:)
|
124
124
|
# The resource will be in the following format:
|
125
125
|
#
|
126
|
-
# `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{
|
126
|
+
# `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
|
127
127
|
#
|
128
128
|
# @param organization [String]
|
129
|
-
# @param
|
129
|
+
# @param module [String]
|
130
130
|
#
|
131
|
-
# @overload effective_event_threat_detection_custom_module_path(folder:,
|
131
|
+
# @overload effective_event_threat_detection_custom_module_path(folder:, module:)
|
132
132
|
# The resource will be in the following format:
|
133
133
|
#
|
134
|
-
# `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{
|
134
|
+
# `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
|
135
135
|
#
|
136
136
|
# @param folder [String]
|
137
|
-
# @param
|
137
|
+
# @param module [String]
|
138
138
|
#
|
139
|
-
# @overload effective_event_threat_detection_custom_module_path(project:,
|
139
|
+
# @overload effective_event_threat_detection_custom_module_path(project:, module:)
|
140
140
|
# The resource will be in the following format:
|
141
141
|
#
|
142
|
-
# `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{
|
142
|
+
# `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
|
143
143
|
#
|
144
144
|
# @param project [String]
|
145
|
-
# @param
|
145
|
+
# @param module [String]
|
146
146
|
#
|
147
147
|
# @return [::String]
|
148
148
|
def effective_event_threat_detection_custom_module_path **args
|
149
149
|
resources = {
|
150
|
-
"
|
150
|
+
"module:organization" => (proc do |organization:, module:|
|
151
151
|
raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
|
152
152
|
|
153
|
-
"organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{
|
153
|
+
"organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
|
154
154
|
end),
|
155
|
-
"folder:
|
155
|
+
"folder:module" => (proc do |folder:, module:|
|
156
156
|
raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
|
157
157
|
|
158
|
-
"folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{
|
158
|
+
"folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
|
159
159
|
end),
|
160
|
-
"
|
160
|
+
"module:project" => (proc do |project:, module:|
|
161
161
|
raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
162
162
|
|
163
|
-
"projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{
|
163
|
+
"projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
|
164
164
|
end)
|
165
165
|
}
|
166
166
|
|
@@ -224,47 +224,47 @@ module Google
|
|
224
224
|
##
|
225
225
|
# Create a fully-qualified EventThreatDetectionCustomModule resource string.
|
226
226
|
#
|
227
|
-
# @overload event_threat_detection_custom_module_path(organization:,
|
227
|
+
# @overload event_threat_detection_custom_module_path(organization:, module:)
|
228
228
|
# The resource will be in the following format:
|
229
229
|
#
|
230
|
-
# `organizations/{organization}/eventThreatDetectionSettings/customModules/{
|
230
|
+
# `organizations/{organization}/eventThreatDetectionSettings/customModules/{module}`
|
231
231
|
#
|
232
232
|
# @param organization [String]
|
233
|
-
# @param
|
233
|
+
# @param module [String]
|
234
234
|
#
|
235
|
-
# @overload event_threat_detection_custom_module_path(folder:,
|
235
|
+
# @overload event_threat_detection_custom_module_path(folder:, module:)
|
236
236
|
# The resource will be in the following format:
|
237
237
|
#
|
238
|
-
# `folders/{folder}/eventThreatDetectionSettings/customModules/{
|
238
|
+
# `folders/{folder}/eventThreatDetectionSettings/customModules/{module}`
|
239
239
|
#
|
240
240
|
# @param folder [String]
|
241
|
-
# @param
|
241
|
+
# @param module [String]
|
242
242
|
#
|
243
|
-
# @overload event_threat_detection_custom_module_path(project:,
|
243
|
+
# @overload event_threat_detection_custom_module_path(project:, module:)
|
244
244
|
# The resource will be in the following format:
|
245
245
|
#
|
246
|
-
# `projects/{project}/eventThreatDetectionSettings/customModules/{
|
246
|
+
# `projects/{project}/eventThreatDetectionSettings/customModules/{module}`
|
247
247
|
#
|
248
248
|
# @param project [String]
|
249
|
-
# @param
|
249
|
+
# @param module [String]
|
250
250
|
#
|
251
251
|
# @return [::String]
|
252
252
|
def event_threat_detection_custom_module_path **args
|
253
253
|
resources = {
|
254
|
-
"
|
254
|
+
"module:organization" => (proc do |organization:, module:|
|
255
255
|
raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
|
256
256
|
|
257
|
-
"organizations/#{organization}/eventThreatDetectionSettings/customModules/#{
|
257
|
+
"organizations/#{organization}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
|
258
258
|
end),
|
259
|
-
"folder:
|
259
|
+
"folder:module" => (proc do |folder:, module:|
|
260
260
|
raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
|
261
261
|
|
262
|
-
"folders/#{folder}/eventThreatDetectionSettings/customModules/#{
|
262
|
+
"folders/#{folder}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
|
263
263
|
end),
|
264
|
-
"
|
264
|
+
"module:project" => (proc do |project:, module:|
|
265
265
|
raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
|
266
266
|
|
267
|
-
"projects/#{project}/eventThreatDetectionSettings/customModules/#{
|
267
|
+
"projects/#{project}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
|
268
268
|
end)
|
269
269
|
}
|
270
270
|
|
@@ -196,9 +196,26 @@ module Google
|
|
196
196
|
# @!attribute [rw] common
|
197
197
|
# @return [::Google::Api::CommonLanguageSettings]
|
198
198
|
# Some settings.
|
199
|
+
# @!attribute [rw] experimental_features
|
200
|
+
# @return [::Google::Api::PythonSettings::ExperimentalFeatures]
|
201
|
+
# Experimental features to be included during client library generation.
|
199
202
|
class PythonSettings
|
200
203
|
include ::Google::Protobuf::MessageExts
|
201
204
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
205
|
+
|
206
|
+
# Experimental features to be included during client library generation.
|
207
|
+
# These fields will be deprecated once the feature graduates and is enabled
|
208
|
+
# by default.
|
209
|
+
# @!attribute [rw] rest_async_io_enabled
|
210
|
+
# @return [::Boolean]
|
211
|
+
# Enables generation of asynchronous REST clients if `rest` transport is
|
212
|
+
# enabled. By default, asynchronous REST clients will not be generated.
|
213
|
+
# This feature will be enabled by default 1 month after launching the
|
214
|
+
# feature in preview packages.
|
215
|
+
class ExperimentalFeatures
|
216
|
+
include ::Google::Protobuf::MessageExts
|
217
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
218
|
+
end
|
202
219
|
end
|
203
220
|
|
204
221
|
# Settings for Node client libraries.
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-security_center-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.2.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-08-
|
11
|
+
date: 2024-08-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|