google-cloud-security_center-v1 1.1.0 → 1.2.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a100af70f1a56ae45c19b78b66d2f114dc8bf3e8e6f8c3f9f6ac4413d74e7bc9
4
- data.tar.gz: 987984d02a85240802ad755ab4363c4ecf12a6936b464cf4d696e090c20b3b9e
3
+ metadata.gz: 055d414ad671f290e4358df978ab7642242beb7261499fa1ce16e057668bd12a
4
+ data.tar.gz: 7c884df91a6817edd4a81465c928fc73500aac3a9643ce4d388f9774b07dd58e
5
5
  SHA512:
6
- metadata.gz: f8e85517c492c3b86fd8e00b267abdf72542edcd0133b4dd1f5fc563a640f94c4a1613d1b1f2582fe6b644d3e82bc7a2695bc404c75bbdc01c323e0fec4aef70
7
- data.tar.gz: 5f9e31568bc88f33fff3c32125b24b551df610cd5712f5a3f7d67bbd4bbbc1c8ef82ae3d17c3586516d1c94714e7530fa0f66f860f68d8d6cb0aa4552348b689
6
+ metadata.gz: 872260165f6fb0c7a8ba60e3950f400a8a693f98e7586f11d2cc960548d1ddb79bbc280d1a4ac71aa675e9ff52fa6066373fec5e077bae6c72a38eb8c3821d0e
7
+ data.tar.gz: 4b95eeb39e191b2d06352a97ab231b80926fad147b9192a5793b05676193605a3e2bd1e2b098ce609d2f440cb1a46ed2ebcd8338a09c3d2b30f7630abfa7282e
@@ -120,47 +120,47 @@ module Google
120
120
  ##
121
121
  # Create a fully-qualified EffectiveEventThreatDetectionCustomModule resource string.
122
122
  #
123
- # @overload effective_event_threat_detection_custom_module_path(organization:, module_param:)
123
+ # @overload effective_event_threat_detection_custom_module_path(organization:, module:)
124
124
  # The resource will be in the following format:
125
125
  #
126
- # `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
126
+ # `organizations/{organization}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
127
127
  #
128
128
  # @param organization [String]
129
- # @param module_param [String]
129
+ # @param module [String]
130
130
  #
131
- # @overload effective_event_threat_detection_custom_module_path(folder:, module_param:)
131
+ # @overload effective_event_threat_detection_custom_module_path(folder:, module:)
132
132
  # The resource will be in the following format:
133
133
  #
134
- # `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
134
+ # `folders/{folder}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
135
135
  #
136
136
  # @param folder [String]
137
- # @param module_param [String]
137
+ # @param module [String]
138
138
  #
139
- # @overload effective_event_threat_detection_custom_module_path(project:, module_param:)
139
+ # @overload effective_event_threat_detection_custom_module_path(project:, module:)
140
140
  # The resource will be in the following format:
141
141
  #
142
- # `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{module_param}`
142
+ # `projects/{project}/eventThreatDetectionSettings/effectiveCustomModules/{module}`
143
143
  #
144
144
  # @param project [String]
145
- # @param module_param [String]
145
+ # @param module [String]
146
146
  #
147
147
  # @return [::String]
148
148
  def effective_event_threat_detection_custom_module_path **args
149
149
  resources = {
150
- "module_param:organization" => (proc do |organization:, module_param:|
150
+ "module:organization" => (proc do |organization:, module:|
151
151
  raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
152
152
 
153
- "organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
153
+ "organizations/#{organization}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
154
154
  end),
155
- "folder:module_param" => (proc do |folder:, module_param:|
155
+ "folder:module" => (proc do |folder:, module:|
156
156
  raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
157
157
 
158
- "folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
158
+ "folders/#{folder}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
159
159
  end),
160
- "module_param:project" => (proc do |project:, module_param:|
160
+ "module:project" => (proc do |project:, module:|
161
161
  raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
162
162
 
163
- "projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{module_param}"
163
+ "projects/#{project}/eventThreatDetectionSettings/effectiveCustomModules/#{binding.local_variable_get :module}"
164
164
  end)
165
165
  }
166
166
 
@@ -224,47 +224,47 @@ module Google
224
224
  ##
225
225
  # Create a fully-qualified EventThreatDetectionCustomModule resource string.
226
226
  #
227
- # @overload event_threat_detection_custom_module_path(organization:, module_param:)
227
+ # @overload event_threat_detection_custom_module_path(organization:, module:)
228
228
  # The resource will be in the following format:
229
229
  #
230
- # `organizations/{organization}/eventThreatDetectionSettings/customModules/{module_param}`
230
+ # `organizations/{organization}/eventThreatDetectionSettings/customModules/{module}`
231
231
  #
232
232
  # @param organization [String]
233
- # @param module_param [String]
233
+ # @param module [String]
234
234
  #
235
- # @overload event_threat_detection_custom_module_path(folder:, module_param:)
235
+ # @overload event_threat_detection_custom_module_path(folder:, module:)
236
236
  # The resource will be in the following format:
237
237
  #
238
- # `folders/{folder}/eventThreatDetectionSettings/customModules/{module_param}`
238
+ # `folders/{folder}/eventThreatDetectionSettings/customModules/{module}`
239
239
  #
240
240
  # @param folder [String]
241
- # @param module_param [String]
241
+ # @param module [String]
242
242
  #
243
- # @overload event_threat_detection_custom_module_path(project:, module_param:)
243
+ # @overload event_threat_detection_custom_module_path(project:, module:)
244
244
  # The resource will be in the following format:
245
245
  #
246
- # `projects/{project}/eventThreatDetectionSettings/customModules/{module_param}`
246
+ # `projects/{project}/eventThreatDetectionSettings/customModules/{module}`
247
247
  #
248
248
  # @param project [String]
249
- # @param module_param [String]
249
+ # @param module [String]
250
250
  #
251
251
  # @return [::String]
252
252
  def event_threat_detection_custom_module_path **args
253
253
  resources = {
254
- "module_param:organization" => (proc do |organization:, module_param:|
254
+ "module:organization" => (proc do |organization:, module:|
255
255
  raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
256
256
 
257
- "organizations/#{organization}/eventThreatDetectionSettings/customModules/#{module_param}"
257
+ "organizations/#{organization}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
258
258
  end),
259
- "folder:module_param" => (proc do |folder:, module_param:|
259
+ "folder:module" => (proc do |folder:, module:|
260
260
  raise ::ArgumentError, "folder cannot contain /" if folder.to_s.include? "/"
261
261
 
262
- "folders/#{folder}/eventThreatDetectionSettings/customModules/#{module_param}"
262
+ "folders/#{folder}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
263
263
  end),
264
- "module_param:project" => (proc do |project:, module_param:|
264
+ "module:project" => (proc do |project:, module:|
265
265
  raise ::ArgumentError, "project cannot contain /" if project.to_s.include? "/"
266
266
 
267
- "projects/#{project}/eventThreatDetectionSettings/customModules/#{module_param}"
267
+ "projects/#{project}/eventThreatDetectionSettings/customModules/#{binding.local_variable_get :module}"
268
268
  end)
269
269
  }
270
270
 
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecurityCenter
23
23
  module V1
24
- VERSION = "1.1.0"
24
+ VERSION = "1.2.0"
25
25
  end
26
26
  end
27
27
  end
@@ -196,9 +196,26 @@ module Google
196
196
  # @!attribute [rw] common
197
197
  # @return [::Google::Api::CommonLanguageSettings]
198
198
  # Some settings.
199
+ # @!attribute [rw] experimental_features
200
+ # @return [::Google::Api::PythonSettings::ExperimentalFeatures]
201
+ # Experimental features to be included during client library generation.
199
202
  class PythonSettings
200
203
  include ::Google::Protobuf::MessageExts
201
204
  extend ::Google::Protobuf::MessageExts::ClassMethods
205
+
206
+ # Experimental features to be included during client library generation.
207
+ # These fields will be deprecated once the feature graduates and is enabled
208
+ # by default.
209
+ # @!attribute [rw] rest_async_io_enabled
210
+ # @return [::Boolean]
211
+ # Enables generation of asynchronous REST clients if `rest` transport is
212
+ # enabled. By default, asynchronous REST clients will not be generated.
213
+ # This feature will be enabled by default 1 month after launching the
214
+ # feature in preview packages.
215
+ class ExperimentalFeatures
216
+ include ::Google::Protobuf::MessageExts
217
+ extend ::Google::Protobuf::MessageExts::ClassMethods
218
+ end
202
219
  end
203
220
 
204
221
  # Settings for Node client libraries.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-security_center-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.0
4
+ version: 1.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-08-08 00:00:00.000000000 Z
11
+ date: 2024-08-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common