google-cloud-security_center-v1 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a100af70f1a56ae45c19b78b66d2f114dc8bf3e8e6f8c3f9f6ac4413d74e7bc9
4
- data.tar.gz: 987984d02a85240802ad755ab4363c4ecf12a6936b464cf4d696e090c20b3b9e
3
+ metadata.gz: 055d414ad671f290e4358df978ab7642242beb7261499fa1ce16e057668bd12a
4
+ data.tar.gz: 7c884df91a6817edd4a81465c928fc73500aac3a9643ce4d388f9774b07dd58e
5
5
  SHA512:
6
- metadata.gz: f8e85517c492c3b86fd8e00b267abdf72542edcd0133b4dd1f5fc563a640f94c4a1613d1b1f2582fe6b644d3e82bc7a2695bc404c75bbdc01c323e0fec4aef70
7
- data.tar.gz: 5f9e31568bc88f33fff3c32125b24b551df610cd5712f5a3f7d67bbd4bbbc1c8ef82ae3d17c3586516d1c94714e7530fa0f66f860f68d8d6cb0aa4552348b689
6
+ metadata.gz: 872260165f6fb0c7a8ba60e3950f400a8a693f98e7586f11d2cc960548d1ddb79bbc280d1a4ac71aa675e9ff52fa6066373fec5e077bae6c72a38eb8c3821d0e
7
+ data.tar.gz: 4b95eeb39e191b2d06352a97ab231b80926fad147b9192a5793b05676193605a3e2bd1e2b098ce609d2f440cb1a46ed2ebcd8338a09c3d2b30f7630abfa7282e
@@ -120,47 +120,47 @@ module Google
120
120
  ##
121
121
  # Create a fully-qualified EffectiveEventThreatDetectionCustomModule resource string.
122
122
  #
123
- # @overload effective_event_threat_detection_custom_module_path(organization:, module_param:)
123
+ # @overload effective_event_threat_detection_custom_module_path(organization:, module:)
124
124
  # The resource will be in the following format:
125
125
  #
126
- # `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
126
+ # `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
127
127
  #
128
128
  # @param organization [String]
129
- # @param module_param [String]
129
+ # @param module [String]
130
130
  #
131
- # @overload effective_event_threat_detection_custom_module_path(folder:, module_param:)
131
+ # @overload effective_event_threat_detection_custom_module_path(folder:, module:)
132
132
  # The resource will be in the following format:
133
133
  #
134
- # `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
134
+ # `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
135
135
  #
136
136
  # @param folder [String]
137
- # @param module_param [String]
137
+ # @param module [String]
138
138
  #
139
- # @overload effective_event_threat_detection_custom_module_path(project:, module_param:)
139
+ # @overload effective_event_threat_detection_custom_module_path(project:, module:)
140
140
  # The resource will be in the following format:
141
141
  #
142
- # `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
142
+ # `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
143
143
  #
144
144
  # @param project [String]
145
- # @param module_param [String]
145
+ # @param module [String]
146
146
  #
147
147
  # @return [::String]
148
148
  def effective_event_threat_detection_custom_module_path **args
149
149
  resources = {
150
- "module_param:organization" => (proc do |organization:, module_param:|
150
+ "module:organization" => (proc do |organization:, module:|
151
151
  raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
152
152
 
153
- "organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
153
+ "organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
154
154
  end),
155
- "folder:module_param" => (proc do |folder:, module_param:|
155
+ "folder:module" => (proc do |folder:, module:|
156
156
  raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
157
157
 
158
- "folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
158
+ "folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
159
159
  end),
160
- "module_param:project" => (proc do |project:, module_param:|
160
+ "module:project" => (proc do |project:, module:|
161
161
  raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
162
162
 
163
- "projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
163
+ "projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
164
164
  end)
165
165
  }
166
166
 
@@ -224,47 +224,47 @@ module Google
224
224
  ##
225
225
  # Create a fully-qualified EventThreatDetectionCustomModule resource string.
226
226
  #
227
- # @overload event_threat_detection_custom_module_path(organization:, module_param:)
227
+ # @overload event_threat_detection_custom_module_path(organization:, module:)
228
228
  # The resource will be in the following format:
229
229
  #
230
- # `organizations/{organization}/eventThreatDetectionSettings/customModules/{module_param}`
230
+ # `organizations/{organization}/eventThreatDetectionSettings/customModules/{module}`
231
231
  #
232
232
  # @param organization [String]
233
- # @param module_param [String]
233
+ # @param module [String]
234
234
  #
235
- # @overload event_threat_detection_custom_module_path(folder:, module_param:)
235
+ # @overload event_threat_detection_custom_module_path(folder:, module:)
236
236
  # The resource will be in the following format:
237
237
  #
238
- # `folders/{folder}/eventThreatDetectionSettings/customModules/{module_param}`
238
+ # `folders/{folder}/eventThreatDetectionSettings/customModules/{module}`
239
239
  #
240
240
  # @param folder [String]
241
- # @param module_param [String]
241
+ # @param module [String]
242
242
  #
243
- # @overload event_threat_detection_custom_module_path(project:, module_param:)
243
+ # @overload event_threat_detection_custom_module_path(project:, module:)
244
244
  # The resource will be in the following format:
245
245
  #
246
- # `projects/{project}/eventThreatDetectionSettings/customModules/{module_param}`
246
+ # `projects/{project}/eventThreatDetectionSettings/customModules/{module}`
247
247
  #
248
248
  # @param project [String]
249
- # @param module_param [String]
249
+ # @param module [String]
250
250
  #
251
251
  # @return [::String]
252
252
  def event_threat_detection_custom_module_path **args
253
253
  resources = {
254
- "module_param:organization" => (proc do |organization:, module_param:|
254
+ "module:organization" => (proc do |organization:, module:|
255
255
  raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
256
256
 
257
- "organizations/#{organization}/eventThreatDetectionSettings/customModules/#{module_param}"
257
+ "organizations/#{organization}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
258
258
  end),
259
- "folder:module_param" => (proc do |folder:, module_param:|
259
+ "folder:module" => (proc do |folder:, module:|
260
260
  raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
261
261
 
262
- "folders/#{folder}/eventThreatDetectionSettings/customModules/#{module_param}"
262
+ "folders/#{folder}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
263
263
  end),
264
- "module_param:project" => (proc do |project:, module_param:|
264
+ "module:project" => (proc do |project:, module:|
265
265
  raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
266
266
 
267
- "projects/#{project}/eventThreatDetectionSettings/customModules/#{module_param}"
267
+ "projects/#{project}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
268
268
  end)
269
269
  }
270
270
 
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecurityCenter
23
23
  module V1
24
- VERSION = "1.1.0"
24
+ VERSION = "1.2.0"
25
25
  end
26
26
  end
27
27
  end
@@ -196,9 +196,26 @@ module Google
196
196
  # @!attribute [rw] common
197
197
  # @return [::Google::Api::CommonLanguageSettings]
198
198
  # Some settings.
199
+ # @!attribute [rw] experimental_features
200
+ # @return [::Google::Api::PythonSettings::ExperimentalFeatures]
201
+ # Experimental features to be included during client library generation.
199
202
  class PythonSettings
200
203
  include ::Google::Protobuf::MessageExts
201
204
  extend ::Google::Protobuf::MessageExts::ClassMethods
205
+
206
+ # Experimental features to be included during client library generation.
207
+ # These fields will be deprecated once the feature graduates and is enabled
208
+ # by default.
209
+ # @!attribute [rw] rest_async_io_enabled
210
+ # @return [::Boolean]
211
+ # Enables generation of asynchronous REST clients if `rest` transport is
212
+ # enabled. By default, asynchronous REST clients will not be generated.
213
+ # This feature will be enabled by default 1 month after launching the
214
+ # feature in preview packages.
215
+ class ExperimentalFeatures
216
+ include ::Google::Protobuf::MessageExts
217
+ extend ::Google::Protobuf::MessageExts::ClassMethods
218
+ end
202
219
  end
203
220
 
204
221
  # Settings for Node client libraries.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-security_center-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.0
4
+ version: 1.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-08-08 00:00:00.000000000 Z
11
+ date: 2024-08-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common