@maxim_mazurok/gapi.client.securitycenter-v1 0.0.20220809
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +5882 -0
- package/package.json +20 -0
- package/readme.md +78 -0
- package/tests.ts +2084 -0
- package/tsconfig.json +18 -0
- package/tslint.json +6 -0
package/tests.ts
ADDED
|
@@ -0,0 +1,2084 @@
|
|
|
1
|
+
/* This is stub file for gapi.client.securitycenter-v1 definition tests */
|
|
2
|
+
// IMPORTANT
|
|
3
|
+
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
4
|
+
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
5
|
+
|
|
6
|
+
// Revision: 20220809
|
|
7
|
+
|
|
8
|
+
gapi.load('client', async () => {
|
|
9
|
+
/** now we can use gapi.client */
|
|
10
|
+
|
|
11
|
+
await gapi.client.load('https://securitycenter.googleapis.com/$discovery/rest?version=v1');
|
|
12
|
+
/** now we can use gapi.client.securitycenter */
|
|
13
|
+
|
|
14
|
+
/** don't forget to authenticate your client before sending any request to resources: */
|
|
15
|
+
/** declare client_id registered in Google Developers Console */
|
|
16
|
+
const client_id = '<<PUT YOUR CLIENT ID HERE>>';
|
|
17
|
+
const scope = [
|
|
18
|
+
/** See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account. */
|
|
19
|
+
'https://www.googleapis.com/auth/cloud-platform',
|
|
20
|
+
];
|
|
21
|
+
const immediate = false;
|
|
22
|
+
gapi.auth.authorize({ client_id, scope, immediate }, authResult => {
|
|
23
|
+
if (authResult && !authResult.error) {
|
|
24
|
+
/** handle successful authorization */
|
|
25
|
+
run();
|
|
26
|
+
} else {
|
|
27
|
+
/** handle authorization error */
|
|
28
|
+
}
|
|
29
|
+
});
|
|
30
|
+
|
|
31
|
+
async function run() {
|
|
32
|
+
/** Filters an organization's assets and groups them by their specified properties. */
|
|
33
|
+
await gapi.client.securitycenter.folders.assets.group({
|
|
34
|
+
parent: "Test string",
|
|
35
|
+
}, {
|
|
36
|
+
compareDuration: "Test string",
|
|
37
|
+
filter: "Test string",
|
|
38
|
+
groupBy: "Test string",
|
|
39
|
+
pageSize: 42,
|
|
40
|
+
pageToken: "Test string",
|
|
41
|
+
readTime: "Test string",
|
|
42
|
+
});
|
|
43
|
+
/** Lists an organization's assets. */
|
|
44
|
+
await gapi.client.securitycenter.folders.assets.list({
|
|
45
|
+
compareDuration: "Test string",
|
|
46
|
+
fieldMask: "Test string",
|
|
47
|
+
filter: "Test string",
|
|
48
|
+
orderBy: "Test string",
|
|
49
|
+
pageSize: 42,
|
|
50
|
+
pageToken: "Test string",
|
|
51
|
+
parent: "Test string",
|
|
52
|
+
readTime: "Test string",
|
|
53
|
+
});
|
|
54
|
+
/** Updates security marks. */
|
|
55
|
+
await gapi.client.securitycenter.folders.assets.updateSecurityMarks({
|
|
56
|
+
name: "Test string",
|
|
57
|
+
startTime: "Test string",
|
|
58
|
+
updateMask: "Test string",
|
|
59
|
+
}, {
|
|
60
|
+
canonicalName: "Test string",
|
|
61
|
+
marks: {
|
|
62
|
+
A: "Test string"
|
|
63
|
+
},
|
|
64
|
+
name: "Test string",
|
|
65
|
+
});
|
|
66
|
+
/** Creates a big query export. */
|
|
67
|
+
await gapi.client.securitycenter.folders.bigQueryExports.create({
|
|
68
|
+
bigQueryExportId: "Test string",
|
|
69
|
+
parent: "Test string",
|
|
70
|
+
}, {
|
|
71
|
+
createTime: "Test string",
|
|
72
|
+
dataset: "Test string",
|
|
73
|
+
description: "Test string",
|
|
74
|
+
filter: "Test string",
|
|
75
|
+
mostRecentEditor: "Test string",
|
|
76
|
+
name: "Test string",
|
|
77
|
+
principal: "Test string",
|
|
78
|
+
updateTime: "Test string",
|
|
79
|
+
});
|
|
80
|
+
/** Deletes an existing big query export. */
|
|
81
|
+
await gapi.client.securitycenter.folders.bigQueryExports.delete({
|
|
82
|
+
name: "Test string",
|
|
83
|
+
});
|
|
84
|
+
/** Gets a big query export. */
|
|
85
|
+
await gapi.client.securitycenter.folders.bigQueryExports.get({
|
|
86
|
+
name: "Test string",
|
|
87
|
+
});
|
|
88
|
+
/**
|
|
89
|
+
* Lists BigQuery exports. Note that when requesting BigQuery exports at a given level all exports under that level are also returned e.g. if requesting BigQuery exports under a folder,
|
|
90
|
+
* then all BigQuery exports immediately under the folder plus the ones created under the projects within the folder are returned.
|
|
91
|
+
*/
|
|
92
|
+
await gapi.client.securitycenter.folders.bigQueryExports.list({
|
|
93
|
+
pageSize: 42,
|
|
94
|
+
pageToken: "Test string",
|
|
95
|
+
parent: "Test string",
|
|
96
|
+
});
|
|
97
|
+
/** Updates a BigQuery export. */
|
|
98
|
+
await gapi.client.securitycenter.folders.bigQueryExports.patch({
|
|
99
|
+
name: "Test string",
|
|
100
|
+
updateMask: "Test string",
|
|
101
|
+
}, {
|
|
102
|
+
createTime: "Test string",
|
|
103
|
+
dataset: "Test string",
|
|
104
|
+
description: "Test string",
|
|
105
|
+
filter: "Test string",
|
|
106
|
+
mostRecentEditor: "Test string",
|
|
107
|
+
name: "Test string",
|
|
108
|
+
principal: "Test string",
|
|
109
|
+
updateTime: "Test string",
|
|
110
|
+
});
|
|
111
|
+
/**
|
|
112
|
+
* Kicks off an LRO to bulk mute findings for a parent based on a filter. The parent can be either an organization, folder or project. The findings matched by the filter will be muted
|
|
113
|
+
* after the LRO is done.
|
|
114
|
+
*/
|
|
115
|
+
await gapi.client.securitycenter.folders.findings.bulkMute({
|
|
116
|
+
parent: "Test string",
|
|
117
|
+
}, {
|
|
118
|
+
filter: "Test string",
|
|
119
|
+
muteAnnotation: "Test string",
|
|
120
|
+
});
|
|
121
|
+
/** Creates a mute config. */
|
|
122
|
+
await gapi.client.securitycenter.folders.muteConfigs.create({
|
|
123
|
+
muteConfigId: "Test string",
|
|
124
|
+
parent: "Test string",
|
|
125
|
+
}, {
|
|
126
|
+
createTime: "Test string",
|
|
127
|
+
description: "Test string",
|
|
128
|
+
displayName: "Test string",
|
|
129
|
+
filter: "Test string",
|
|
130
|
+
mostRecentEditor: "Test string",
|
|
131
|
+
name: "Test string",
|
|
132
|
+
updateTime: "Test string",
|
|
133
|
+
});
|
|
134
|
+
/** Deletes an existing mute config. */
|
|
135
|
+
await gapi.client.securitycenter.folders.muteConfigs.delete({
|
|
136
|
+
name: "Test string",
|
|
137
|
+
});
|
|
138
|
+
/** Gets a mute config. */
|
|
139
|
+
await gapi.client.securitycenter.folders.muteConfigs.get({
|
|
140
|
+
name: "Test string",
|
|
141
|
+
});
|
|
142
|
+
/** Lists mute configs. */
|
|
143
|
+
await gapi.client.securitycenter.folders.muteConfigs.list({
|
|
144
|
+
pageSize: 42,
|
|
145
|
+
pageToken: "Test string",
|
|
146
|
+
parent: "Test string",
|
|
147
|
+
});
|
|
148
|
+
/** Updates a mute config. */
|
|
149
|
+
await gapi.client.securitycenter.folders.muteConfigs.patch({
|
|
150
|
+
name: "Test string",
|
|
151
|
+
updateMask: "Test string",
|
|
152
|
+
}, {
|
|
153
|
+
createTime: "Test string",
|
|
154
|
+
description: "Test string",
|
|
155
|
+
displayName: "Test string",
|
|
156
|
+
filter: "Test string",
|
|
157
|
+
mostRecentEditor: "Test string",
|
|
158
|
+
name: "Test string",
|
|
159
|
+
updateTime: "Test string",
|
|
160
|
+
});
|
|
161
|
+
/** Lists all sources belonging to an organization. */
|
|
162
|
+
await gapi.client.securitycenter.folders.sources.list({
|
|
163
|
+
pageSize: 42,
|
|
164
|
+
pageToken: "Test string",
|
|
165
|
+
parent: "Test string",
|
|
166
|
+
});
|
|
167
|
+
/**
|
|
168
|
+
* Filters an organization or source's findings and groups them by their specified properties. To group across all sources provide a `-` as the source id. Example:
|
|
169
|
+
* /v1/organizations/{organization_id}/sources/-/findings, /v1/folders/{folder_id}/sources/-/findings, /v1/projects/{project_id}/sources/-/findings
|
|
170
|
+
*/
|
|
171
|
+
await gapi.client.securitycenter.folders.sources.findings.group({
|
|
172
|
+
parent: "Test string",
|
|
173
|
+
}, {
|
|
174
|
+
compareDuration: "Test string",
|
|
175
|
+
filter: "Test string",
|
|
176
|
+
groupBy: "Test string",
|
|
177
|
+
pageSize: 42,
|
|
178
|
+
pageToken: "Test string",
|
|
179
|
+
readTime: "Test string",
|
|
180
|
+
});
|
|
181
|
+
/** Lists an organization or source's findings. To list across all sources provide a `-` as the source id. Example: /v1/organizations/{organization_id}/sources/-/findings */
|
|
182
|
+
await gapi.client.securitycenter.folders.sources.findings.list({
|
|
183
|
+
compareDuration: "Test string",
|
|
184
|
+
fieldMask: "Test string",
|
|
185
|
+
filter: "Test string",
|
|
186
|
+
orderBy: "Test string",
|
|
187
|
+
pageSize: 42,
|
|
188
|
+
pageToken: "Test string",
|
|
189
|
+
parent: "Test string",
|
|
190
|
+
readTime: "Test string",
|
|
191
|
+
});
|
|
192
|
+
/** Creates or updates a finding. The corresponding source must exist for a finding creation to succeed. */
|
|
193
|
+
await gapi.client.securitycenter.folders.sources.findings.patch({
|
|
194
|
+
name: "Test string",
|
|
195
|
+
updateMask: "Test string",
|
|
196
|
+
}, {
|
|
197
|
+
access: {
|
|
198
|
+
callerIp: "Test string",
|
|
199
|
+
callerIpGeo: {
|
|
200
|
+
regionCode: "Test string",
|
|
201
|
+
},
|
|
202
|
+
methodName: "Test string",
|
|
203
|
+
principalEmail: "Test string",
|
|
204
|
+
principalSubject: "Test string",
|
|
205
|
+
serviceAccountDelegationInfo: [
|
|
206
|
+
{
|
|
207
|
+
principalEmail: "Test string",
|
|
208
|
+
principalSubject: "Test string",
|
|
209
|
+
}
|
|
210
|
+
],
|
|
211
|
+
serviceAccountKeyName: "Test string",
|
|
212
|
+
serviceName: "Test string",
|
|
213
|
+
userAgentFamily: "Test string",
|
|
214
|
+
},
|
|
215
|
+
canonicalName: "Test string",
|
|
216
|
+
category: "Test string",
|
|
217
|
+
compliances: [
|
|
218
|
+
{
|
|
219
|
+
ids: [
|
|
220
|
+
"Test string"
|
|
221
|
+
],
|
|
222
|
+
standard: "Test string",
|
|
223
|
+
version: "Test string",
|
|
224
|
+
}
|
|
225
|
+
],
|
|
226
|
+
connections: [
|
|
227
|
+
{
|
|
228
|
+
destinationIp: "Test string",
|
|
229
|
+
destinationPort: 42,
|
|
230
|
+
protocol: "Test string",
|
|
231
|
+
sourceIp: "Test string",
|
|
232
|
+
sourcePort: 42,
|
|
233
|
+
}
|
|
234
|
+
],
|
|
235
|
+
contacts: {
|
|
236
|
+
A: {
|
|
237
|
+
contacts: [
|
|
238
|
+
{
|
|
239
|
+
email: "Test string",
|
|
240
|
+
}
|
|
241
|
+
],
|
|
242
|
+
}
|
|
243
|
+
},
|
|
244
|
+
containers: [
|
|
245
|
+
{
|
|
246
|
+
imageId: "Test string",
|
|
247
|
+
labels: [
|
|
248
|
+
{
|
|
249
|
+
name: "Test string",
|
|
250
|
+
value: "Test string",
|
|
251
|
+
}
|
|
252
|
+
],
|
|
253
|
+
name: "Test string",
|
|
254
|
+
uri: "Test string",
|
|
255
|
+
}
|
|
256
|
+
],
|
|
257
|
+
createTime: "Test string",
|
|
258
|
+
database: {
|
|
259
|
+
displayName: "Test string",
|
|
260
|
+
grantees: [
|
|
261
|
+
"Test string"
|
|
262
|
+
],
|
|
263
|
+
name: "Test string",
|
|
264
|
+
query: "Test string",
|
|
265
|
+
userName: "Test string",
|
|
266
|
+
},
|
|
267
|
+
description: "Test string",
|
|
268
|
+
eventTime: "Test string",
|
|
269
|
+
exfiltration: {
|
|
270
|
+
sources: [
|
|
271
|
+
{
|
|
272
|
+
components: [
|
|
273
|
+
"Test string"
|
|
274
|
+
],
|
|
275
|
+
name: "Test string",
|
|
276
|
+
}
|
|
277
|
+
],
|
|
278
|
+
targets: [
|
|
279
|
+
{
|
|
280
|
+
components: [
|
|
281
|
+
"Test string"
|
|
282
|
+
],
|
|
283
|
+
name: "Test string",
|
|
284
|
+
}
|
|
285
|
+
],
|
|
286
|
+
},
|
|
287
|
+
externalSystems: {
|
|
288
|
+
A: {
|
|
289
|
+
assignees: [
|
|
290
|
+
"Test string"
|
|
291
|
+
],
|
|
292
|
+
externalSystemUpdateTime: "Test string",
|
|
293
|
+
externalUid: "Test string",
|
|
294
|
+
name: "Test string",
|
|
295
|
+
status: "Test string",
|
|
296
|
+
}
|
|
297
|
+
},
|
|
298
|
+
externalUri: "Test string",
|
|
299
|
+
findingClass: "Test string",
|
|
300
|
+
iamBindings: [
|
|
301
|
+
{
|
|
302
|
+
action: "Test string",
|
|
303
|
+
member: "Test string",
|
|
304
|
+
role: "Test string",
|
|
305
|
+
}
|
|
306
|
+
],
|
|
307
|
+
indicator: {
|
|
308
|
+
domains: [
|
|
309
|
+
"Test string"
|
|
310
|
+
],
|
|
311
|
+
ipAddresses: [
|
|
312
|
+
"Test string"
|
|
313
|
+
],
|
|
314
|
+
signatures: [
|
|
315
|
+
{
|
|
316
|
+
memoryHashSignature: {
|
|
317
|
+
binaryFamily: "Test string",
|
|
318
|
+
detections: [
|
|
319
|
+
{
|
|
320
|
+
binary: "Test string",
|
|
321
|
+
percentPagesMatched: 42,
|
|
322
|
+
}
|
|
323
|
+
],
|
|
324
|
+
},
|
|
325
|
+
yaraRuleSignature: {
|
|
326
|
+
yaraRule: "Test string",
|
|
327
|
+
},
|
|
328
|
+
}
|
|
329
|
+
],
|
|
330
|
+
uris: [
|
|
331
|
+
"Test string"
|
|
332
|
+
],
|
|
333
|
+
},
|
|
334
|
+
kubernetes: {
|
|
335
|
+
accessReviews: [
|
|
336
|
+
{
|
|
337
|
+
group: "Test string",
|
|
338
|
+
name: "Test string",
|
|
339
|
+
ns: "Test string",
|
|
340
|
+
resource: "Test string",
|
|
341
|
+
subresource: "Test string",
|
|
342
|
+
verb: "Test string",
|
|
343
|
+
version: "Test string",
|
|
344
|
+
}
|
|
345
|
+
],
|
|
346
|
+
bindings: [
|
|
347
|
+
{
|
|
348
|
+
name: "Test string",
|
|
349
|
+
ns: "Test string",
|
|
350
|
+
role: {
|
|
351
|
+
kind: "Test string",
|
|
352
|
+
name: "Test string",
|
|
353
|
+
ns: "Test string",
|
|
354
|
+
},
|
|
355
|
+
subjects: [
|
|
356
|
+
{
|
|
357
|
+
kind: "Test string",
|
|
358
|
+
name: "Test string",
|
|
359
|
+
ns: "Test string",
|
|
360
|
+
}
|
|
361
|
+
],
|
|
362
|
+
}
|
|
363
|
+
],
|
|
364
|
+
nodePools: [
|
|
365
|
+
{
|
|
366
|
+
name: "Test string",
|
|
367
|
+
nodes: [
|
|
368
|
+
{
|
|
369
|
+
name: "Test string",
|
|
370
|
+
}
|
|
371
|
+
],
|
|
372
|
+
}
|
|
373
|
+
],
|
|
374
|
+
nodes: [
|
|
375
|
+
{
|
|
376
|
+
name: "Test string",
|
|
377
|
+
}
|
|
378
|
+
],
|
|
379
|
+
pods: [
|
|
380
|
+
{
|
|
381
|
+
containers: [
|
|
382
|
+
{
|
|
383
|
+
imageId: "Test string",
|
|
384
|
+
labels: [
|
|
385
|
+
{
|
|
386
|
+
name: "Test string",
|
|
387
|
+
value: "Test string",
|
|
388
|
+
}
|
|
389
|
+
],
|
|
390
|
+
name: "Test string",
|
|
391
|
+
uri: "Test string",
|
|
392
|
+
}
|
|
393
|
+
],
|
|
394
|
+
labels: [
|
|
395
|
+
{
|
|
396
|
+
name: "Test string",
|
|
397
|
+
value: "Test string",
|
|
398
|
+
}
|
|
399
|
+
],
|
|
400
|
+
name: "Test string",
|
|
401
|
+
ns: "Test string",
|
|
402
|
+
}
|
|
403
|
+
],
|
|
404
|
+
roles: [
|
|
405
|
+
{
|
|
406
|
+
kind: "Test string",
|
|
407
|
+
name: "Test string",
|
|
408
|
+
ns: "Test string",
|
|
409
|
+
}
|
|
410
|
+
],
|
|
411
|
+
},
|
|
412
|
+
mitreAttack: {
|
|
413
|
+
additionalTactics: [
|
|
414
|
+
"Test string"
|
|
415
|
+
],
|
|
416
|
+
additionalTechniques: [
|
|
417
|
+
"Test string"
|
|
418
|
+
],
|
|
419
|
+
primaryTactic: "Test string",
|
|
420
|
+
primaryTechniques: [
|
|
421
|
+
"Test string"
|
|
422
|
+
],
|
|
423
|
+
version: "Test string",
|
|
424
|
+
},
|
|
425
|
+
mute: "Test string",
|
|
426
|
+
muteInitiator: "Test string",
|
|
427
|
+
muteUpdateTime: "Test string",
|
|
428
|
+
name: "Test string",
|
|
429
|
+
nextSteps: "Test string",
|
|
430
|
+
parent: "Test string",
|
|
431
|
+
processes: [
|
|
432
|
+
{
|
|
433
|
+
args: [
|
|
434
|
+
"Test string"
|
|
435
|
+
],
|
|
436
|
+
argumentsTruncated: true,
|
|
437
|
+
binary: {
|
|
438
|
+
contents: "Test string",
|
|
439
|
+
hashedSize: "Test string",
|
|
440
|
+
partiallyHashed: true,
|
|
441
|
+
path: "Test string",
|
|
442
|
+
sha256: "Test string",
|
|
443
|
+
size: "Test string",
|
|
444
|
+
},
|
|
445
|
+
envVariables: [
|
|
446
|
+
{
|
|
447
|
+
name: "Test string",
|
|
448
|
+
val: "Test string",
|
|
449
|
+
}
|
|
450
|
+
],
|
|
451
|
+
envVariablesTruncated: true,
|
|
452
|
+
libraries: [
|
|
453
|
+
{
|
|
454
|
+
contents: "Test string",
|
|
455
|
+
hashedSize: "Test string",
|
|
456
|
+
partiallyHashed: true,
|
|
457
|
+
path: "Test string",
|
|
458
|
+
sha256: "Test string",
|
|
459
|
+
size: "Test string",
|
|
460
|
+
}
|
|
461
|
+
],
|
|
462
|
+
name: "Test string",
|
|
463
|
+
parentPid: "Test string",
|
|
464
|
+
pid: "Test string",
|
|
465
|
+
script: {
|
|
466
|
+
contents: "Test string",
|
|
467
|
+
hashedSize: "Test string",
|
|
468
|
+
partiallyHashed: true,
|
|
469
|
+
path: "Test string",
|
|
470
|
+
sha256: "Test string",
|
|
471
|
+
size: "Test string",
|
|
472
|
+
},
|
|
473
|
+
}
|
|
474
|
+
],
|
|
475
|
+
resourceName: "Test string",
|
|
476
|
+
securityMarks: {
|
|
477
|
+
canonicalName: "Test string",
|
|
478
|
+
marks: {
|
|
479
|
+
A: "Test string"
|
|
480
|
+
},
|
|
481
|
+
name: "Test string",
|
|
482
|
+
},
|
|
483
|
+
severity: "Test string",
|
|
484
|
+
sourceProperties: {
|
|
485
|
+
A: 42
|
|
486
|
+
},
|
|
487
|
+
state: "Test string",
|
|
488
|
+
vulnerability: {
|
|
489
|
+
cve: {
|
|
490
|
+
cvssv3: {
|
|
491
|
+
attackComplexity: "Test string",
|
|
492
|
+
attackVector: "Test string",
|
|
493
|
+
availabilityImpact: "Test string",
|
|
494
|
+
baseScore: 42,
|
|
495
|
+
confidentialityImpact: "Test string",
|
|
496
|
+
integrityImpact: "Test string",
|
|
497
|
+
privilegesRequired: "Test string",
|
|
498
|
+
scope: "Test string",
|
|
499
|
+
userInteraction: "Test string",
|
|
500
|
+
},
|
|
501
|
+
id: "Test string",
|
|
502
|
+
references: [
|
|
503
|
+
{
|
|
504
|
+
source: "Test string",
|
|
505
|
+
uri: "Test string",
|
|
506
|
+
}
|
|
507
|
+
],
|
|
508
|
+
upstreamFixAvailable: true,
|
|
509
|
+
},
|
|
510
|
+
},
|
|
511
|
+
});
|
|
512
|
+
/** Updates the mute state of a finding. */
|
|
513
|
+
await gapi.client.securitycenter.folders.sources.findings.setMute({
|
|
514
|
+
name: "Test string",
|
|
515
|
+
}, {
|
|
516
|
+
mute: "Test string",
|
|
517
|
+
});
|
|
518
|
+
/** Updates the state of a finding. */
|
|
519
|
+
await gapi.client.securitycenter.folders.sources.findings.setState({
|
|
520
|
+
name: "Test string",
|
|
521
|
+
}, {
|
|
522
|
+
startTime: "Test string",
|
|
523
|
+
state: "Test string",
|
|
524
|
+
});
|
|
525
|
+
/** Updates security marks. */
|
|
526
|
+
await gapi.client.securitycenter.folders.sources.findings.updateSecurityMarks({
|
|
527
|
+
name: "Test string",
|
|
528
|
+
startTime: "Test string",
|
|
529
|
+
updateMask: "Test string",
|
|
530
|
+
}, {
|
|
531
|
+
canonicalName: "Test string",
|
|
532
|
+
marks: {
|
|
533
|
+
A: "Test string"
|
|
534
|
+
},
|
|
535
|
+
name: "Test string",
|
|
536
|
+
});
|
|
537
|
+
/** Updates external system. This is for a given finding. */
|
|
538
|
+
await gapi.client.securitycenter.folders.sources.findings.externalSystems.patch({
|
|
539
|
+
name: "Test string",
|
|
540
|
+
updateMask: "Test string",
|
|
541
|
+
}, {
|
|
542
|
+
assignees: [
|
|
543
|
+
"Test string"
|
|
544
|
+
],
|
|
545
|
+
externalSystemUpdateTime: "Test string",
|
|
546
|
+
externalUid: "Test string",
|
|
547
|
+
name: "Test string",
|
|
548
|
+
status: "Test string",
|
|
549
|
+
});
|
|
550
|
+
/** Gets the settings for an organization. */
|
|
551
|
+
await gapi.client.securitycenter.organizations.getOrganizationSettings({
|
|
552
|
+
name: "Test string",
|
|
553
|
+
});
|
|
554
|
+
/** Updates an organization's settings. */
|
|
555
|
+
await gapi.client.securitycenter.organizations.updateOrganizationSettings({
|
|
556
|
+
name: "Test string",
|
|
557
|
+
updateMask: "Test string",
|
|
558
|
+
}, {
|
|
559
|
+
assetDiscoveryConfig: {
|
|
560
|
+
folderIds: [
|
|
561
|
+
"Test string"
|
|
562
|
+
],
|
|
563
|
+
inclusionMode: "Test string",
|
|
564
|
+
projectIds: [
|
|
565
|
+
"Test string"
|
|
566
|
+
],
|
|
567
|
+
},
|
|
568
|
+
enableAssetDiscovery: true,
|
|
569
|
+
name: "Test string",
|
|
570
|
+
});
|
|
571
|
+
/** Filters an organization's assets and groups them by their specified properties. */
|
|
572
|
+
await gapi.client.securitycenter.organizations.assets.group({
|
|
573
|
+
parent: "Test string",
|
|
574
|
+
}, {
|
|
575
|
+
compareDuration: "Test string",
|
|
576
|
+
filter: "Test string",
|
|
577
|
+
groupBy: "Test string",
|
|
578
|
+
pageSize: 42,
|
|
579
|
+
pageToken: "Test string",
|
|
580
|
+
readTime: "Test string",
|
|
581
|
+
});
|
|
582
|
+
/** Lists an organization's assets. */
|
|
583
|
+
await gapi.client.securitycenter.organizations.assets.list({
|
|
584
|
+
compareDuration: "Test string",
|
|
585
|
+
fieldMask: "Test string",
|
|
586
|
+
filter: "Test string",
|
|
587
|
+
orderBy: "Test string",
|
|
588
|
+
pageSize: 42,
|
|
589
|
+
pageToken: "Test string",
|
|
590
|
+
parent: "Test string",
|
|
591
|
+
readTime: "Test string",
|
|
592
|
+
});
|
|
593
|
+
/**
|
|
594
|
+
* Runs asset discovery. The discovery is tracked with a long-running operation. This API can only be called with limited frequency for an organization. If it is called too frequently the
|
|
595
|
+
* caller will receive a TOO_MANY_REQUESTS error.
|
|
596
|
+
*/
|
|
597
|
+
await gapi.client.securitycenter.organizations.assets.runDiscovery({
|
|
598
|
+
parent: "Test string",
|
|
599
|
+
}, {
|
|
600
|
+
});
|
|
601
|
+
/** Updates security marks. */
|
|
602
|
+
await gapi.client.securitycenter.organizations.assets.updateSecurityMarks({
|
|
603
|
+
name: "Test string",
|
|
604
|
+
startTime: "Test string",
|
|
605
|
+
updateMask: "Test string",
|
|
606
|
+
}, {
|
|
607
|
+
canonicalName: "Test string",
|
|
608
|
+
marks: {
|
|
609
|
+
A: "Test string"
|
|
610
|
+
},
|
|
611
|
+
name: "Test string",
|
|
612
|
+
});
|
|
613
|
+
/** Creates a big query export. */
|
|
614
|
+
await gapi.client.securitycenter.organizations.bigQueryExports.create({
|
|
615
|
+
bigQueryExportId: "Test string",
|
|
616
|
+
parent: "Test string",
|
|
617
|
+
}, {
|
|
618
|
+
createTime: "Test string",
|
|
619
|
+
dataset: "Test string",
|
|
620
|
+
description: "Test string",
|
|
621
|
+
filter: "Test string",
|
|
622
|
+
mostRecentEditor: "Test string",
|
|
623
|
+
name: "Test string",
|
|
624
|
+
principal: "Test string",
|
|
625
|
+
updateTime: "Test string",
|
|
626
|
+
});
|
|
627
|
+
/** Deletes an existing big query export. */
|
|
628
|
+
await gapi.client.securitycenter.organizations.bigQueryExports.delete({
|
|
629
|
+
name: "Test string",
|
|
630
|
+
});
|
|
631
|
+
/** Gets a big query export. */
|
|
632
|
+
await gapi.client.securitycenter.organizations.bigQueryExports.get({
|
|
633
|
+
name: "Test string",
|
|
634
|
+
});
|
|
635
|
+
/**
|
|
636
|
+
* Lists BigQuery exports. Note that when requesting BigQuery exports at a given level all exports under that level are also returned e.g. if requesting BigQuery exports under a folder,
|
|
637
|
+
* then all BigQuery exports immediately under the folder plus the ones created under the projects within the folder are returned.
|
|
638
|
+
*/
|
|
639
|
+
await gapi.client.securitycenter.organizations.bigQueryExports.list({
|
|
640
|
+
pageSize: 42,
|
|
641
|
+
pageToken: "Test string",
|
|
642
|
+
parent: "Test string",
|
|
643
|
+
});
|
|
644
|
+
/** Updates a BigQuery export. */
|
|
645
|
+
await gapi.client.securitycenter.organizations.bigQueryExports.patch({
|
|
646
|
+
name: "Test string",
|
|
647
|
+
updateMask: "Test string",
|
|
648
|
+
}, {
|
|
649
|
+
createTime: "Test string",
|
|
650
|
+
dataset: "Test string",
|
|
651
|
+
description: "Test string",
|
|
652
|
+
filter: "Test string",
|
|
653
|
+
mostRecentEditor: "Test string",
|
|
654
|
+
name: "Test string",
|
|
655
|
+
principal: "Test string",
|
|
656
|
+
updateTime: "Test string",
|
|
657
|
+
});
|
|
658
|
+
/**
|
|
659
|
+
* Kicks off an LRO to bulk mute findings for a parent based on a filter. The parent can be either an organization, folder or project. The findings matched by the filter will be muted
|
|
660
|
+
* after the LRO is done.
|
|
661
|
+
*/
|
|
662
|
+
await gapi.client.securitycenter.organizations.findings.bulkMute({
|
|
663
|
+
parent: "Test string",
|
|
664
|
+
}, {
|
|
665
|
+
filter: "Test string",
|
|
666
|
+
muteAnnotation: "Test string",
|
|
667
|
+
});
|
|
668
|
+
/** Creates a mute config. */
|
|
669
|
+
await gapi.client.securitycenter.organizations.muteConfigs.create({
|
|
670
|
+
muteConfigId: "Test string",
|
|
671
|
+
parent: "Test string",
|
|
672
|
+
}, {
|
|
673
|
+
createTime: "Test string",
|
|
674
|
+
description: "Test string",
|
|
675
|
+
displayName: "Test string",
|
|
676
|
+
filter: "Test string",
|
|
677
|
+
mostRecentEditor: "Test string",
|
|
678
|
+
name: "Test string",
|
|
679
|
+
updateTime: "Test string",
|
|
680
|
+
});
|
|
681
|
+
/** Deletes an existing mute config. */
|
|
682
|
+
await gapi.client.securitycenter.organizations.muteConfigs.delete({
|
|
683
|
+
name: "Test string",
|
|
684
|
+
});
|
|
685
|
+
/** Gets a mute config. */
|
|
686
|
+
await gapi.client.securitycenter.organizations.muteConfigs.get({
|
|
687
|
+
name: "Test string",
|
|
688
|
+
});
|
|
689
|
+
/** Lists mute configs. */
|
|
690
|
+
await gapi.client.securitycenter.organizations.muteConfigs.list({
|
|
691
|
+
pageSize: 42,
|
|
692
|
+
pageToken: "Test string",
|
|
693
|
+
parent: "Test string",
|
|
694
|
+
});
|
|
695
|
+
/** Updates a mute config. */
|
|
696
|
+
await gapi.client.securitycenter.organizations.muteConfigs.patch({
|
|
697
|
+
name: "Test string",
|
|
698
|
+
updateMask: "Test string",
|
|
699
|
+
}, {
|
|
700
|
+
createTime: "Test string",
|
|
701
|
+
description: "Test string",
|
|
702
|
+
displayName: "Test string",
|
|
703
|
+
filter: "Test string",
|
|
704
|
+
mostRecentEditor: "Test string",
|
|
705
|
+
name: "Test string",
|
|
706
|
+
updateTime: "Test string",
|
|
707
|
+
});
|
|
708
|
+
/** Creates a notification config. */
|
|
709
|
+
await gapi.client.securitycenter.organizations.notificationConfigs.create({
|
|
710
|
+
configId: "Test string",
|
|
711
|
+
parent: "Test string",
|
|
712
|
+
}, {
|
|
713
|
+
description: "Test string",
|
|
714
|
+
name: "Test string",
|
|
715
|
+
pubsubTopic: "Test string",
|
|
716
|
+
serviceAccount: "Test string",
|
|
717
|
+
streamingConfig: {
|
|
718
|
+
filter: "Test string",
|
|
719
|
+
},
|
|
720
|
+
});
|
|
721
|
+
/** Deletes a notification config. */
|
|
722
|
+
await gapi.client.securitycenter.organizations.notificationConfigs.delete({
|
|
723
|
+
name: "Test string",
|
|
724
|
+
});
|
|
725
|
+
/** Gets a notification config. */
|
|
726
|
+
await gapi.client.securitycenter.organizations.notificationConfigs.get({
|
|
727
|
+
name: "Test string",
|
|
728
|
+
});
|
|
729
|
+
/** Lists notification configs. */
|
|
730
|
+
await gapi.client.securitycenter.organizations.notificationConfigs.list({
|
|
731
|
+
pageSize: 42,
|
|
732
|
+
pageToken: "Test string",
|
|
733
|
+
parent: "Test string",
|
|
734
|
+
});
|
|
735
|
+
/** Updates a notification config. The following update fields are allowed: description, pubsub_topic, streaming_config.filter */
|
|
736
|
+
await gapi.client.securitycenter.organizations.notificationConfigs.patch({
|
|
737
|
+
name: "Test string",
|
|
738
|
+
updateMask: "Test string",
|
|
739
|
+
}, {
|
|
740
|
+
description: "Test string",
|
|
741
|
+
name: "Test string",
|
|
742
|
+
pubsubTopic: "Test string",
|
|
743
|
+
serviceAccount: "Test string",
|
|
744
|
+
streamingConfig: {
|
|
745
|
+
filter: "Test string",
|
|
746
|
+
},
|
|
747
|
+
});
|
|
748
|
+
/**
|
|
749
|
+
* Starts asynchronous cancellation on a long-running operation. The server makes a best effort to cancel the operation, but success is not guaranteed. If the server doesn't support this
|
|
750
|
+
* method, it returns `google.rpc.Code.UNIMPLEMENTED`. Clients can use Operations.GetOperation or other methods to check whether the cancellation succeeded or whether the operation
|
|
751
|
+
* completed despite cancellation. On successful cancellation, the operation is not deleted; instead, it becomes an operation with an Operation.error value with a google.rpc.Status.code of
|
|
752
|
+
* 1, corresponding to `Code.CANCELLED`.
|
|
753
|
+
*/
|
|
754
|
+
await gapi.client.securitycenter.organizations.operations.cancel({
|
|
755
|
+
name: "Test string",
|
|
756
|
+
});
|
|
757
|
+
/**
|
|
758
|
+
* Deletes a long-running operation. This method indicates that the client is no longer interested in the operation result. It does not cancel the operation. If the server doesn't support
|
|
759
|
+
* this method, it returns `google.rpc.Code.UNIMPLEMENTED`.
|
|
760
|
+
*/
|
|
761
|
+
await gapi.client.securitycenter.organizations.operations.delete({
|
|
762
|
+
name: "Test string",
|
|
763
|
+
});
|
|
764
|
+
/** Gets the latest state of a long-running operation. Clients can use this method to poll the operation result at intervals as recommended by the API service. */
|
|
765
|
+
await gapi.client.securitycenter.organizations.operations.get({
|
|
766
|
+
name: "Test string",
|
|
767
|
+
});
|
|
768
|
+
/**
|
|
769
|
+
* Lists operations that match the specified filter in the request. If the server doesn't support this method, it returns `UNIMPLEMENTED`. NOTE: the `name` binding allows API services to
|
|
770
|
+
* override the binding to use different resource name schemes, such as `users/*/operations`. To override the binding, API services can add a binding such as
|
|
771
|
+
* `"/v1/{name=users/*}/operations"` to their service configuration. For backwards compatibility, the default name includes the operations collection id, however overriding users must
|
|
772
|
+
* ensure the name binding is the parent resource, without the operations collection id.
|
|
773
|
+
*/
|
|
774
|
+
await gapi.client.securitycenter.organizations.operations.list({
|
|
775
|
+
filter: "Test string",
|
|
776
|
+
name: "Test string",
|
|
777
|
+
pageSize: 42,
|
|
778
|
+
pageToken: "Test string",
|
|
779
|
+
});
|
|
780
|
+
/** Creates a source. */
|
|
781
|
+
await gapi.client.securitycenter.organizations.sources.create({
|
|
782
|
+
parent: "Test string",
|
|
783
|
+
}, {
|
|
784
|
+
canonicalName: "Test string",
|
|
785
|
+
description: "Test string",
|
|
786
|
+
displayName: "Test string",
|
|
787
|
+
name: "Test string",
|
|
788
|
+
});
|
|
789
|
+
/** Gets a source. */
|
|
790
|
+
await gapi.client.securitycenter.organizations.sources.get({
|
|
791
|
+
name: "Test string",
|
|
792
|
+
});
|
|
793
|
+
/** Gets the access control policy on the specified Source. */
|
|
794
|
+
await gapi.client.securitycenter.organizations.sources.getIamPolicy({
|
|
795
|
+
resource: "Test string",
|
|
796
|
+
}, {
|
|
797
|
+
options: {
|
|
798
|
+
requestedPolicyVersion: 42,
|
|
799
|
+
},
|
|
800
|
+
});
|
|
801
|
+
/** Lists all sources belonging to an organization. */
|
|
802
|
+
await gapi.client.securitycenter.organizations.sources.list({
|
|
803
|
+
pageSize: 42,
|
|
804
|
+
pageToken: "Test string",
|
|
805
|
+
parent: "Test string",
|
|
806
|
+
});
|
|
807
|
+
/** Updates a source. */
|
|
808
|
+
await gapi.client.securitycenter.organizations.sources.patch({
|
|
809
|
+
name: "Test string",
|
|
810
|
+
updateMask: "Test string",
|
|
811
|
+
}, {
|
|
812
|
+
canonicalName: "Test string",
|
|
813
|
+
description: "Test string",
|
|
814
|
+
displayName: "Test string",
|
|
815
|
+
name: "Test string",
|
|
816
|
+
});
|
|
817
|
+
/** Sets the access control policy on the specified Source. */
|
|
818
|
+
await gapi.client.securitycenter.organizations.sources.setIamPolicy({
|
|
819
|
+
resource: "Test string",
|
|
820
|
+
}, {
|
|
821
|
+
policy: {
|
|
822
|
+
auditConfigs: [
|
|
823
|
+
{
|
|
824
|
+
auditLogConfigs: [
|
|
825
|
+
{
|
|
826
|
+
exemptedMembers: [
|
|
827
|
+
"Test string"
|
|
828
|
+
],
|
|
829
|
+
logType: "Test string",
|
|
830
|
+
}
|
|
831
|
+
],
|
|
832
|
+
service: "Test string",
|
|
833
|
+
}
|
|
834
|
+
],
|
|
835
|
+
bindings: [
|
|
836
|
+
{
|
|
837
|
+
condition: {
|
|
838
|
+
description: "Test string",
|
|
839
|
+
expression: "Test string",
|
|
840
|
+
location: "Test string",
|
|
841
|
+
title: "Test string",
|
|
842
|
+
},
|
|
843
|
+
members: [
|
|
844
|
+
"Test string"
|
|
845
|
+
],
|
|
846
|
+
role: "Test string",
|
|
847
|
+
}
|
|
848
|
+
],
|
|
849
|
+
etag: "Test string",
|
|
850
|
+
version: 42,
|
|
851
|
+
},
|
|
852
|
+
updateMask: "Test string",
|
|
853
|
+
});
|
|
854
|
+
/** Returns the permissions that a caller has on the specified source. */
|
|
855
|
+
await gapi.client.securitycenter.organizations.sources.testIamPermissions({
|
|
856
|
+
resource: "Test string",
|
|
857
|
+
}, {
|
|
858
|
+
permissions: [
|
|
859
|
+
"Test string"
|
|
860
|
+
],
|
|
861
|
+
});
|
|
862
|
+
/** Creates a finding. The corresponding source must exist for finding creation to succeed. */
|
|
863
|
+
await gapi.client.securitycenter.organizations.sources.findings.create({
|
|
864
|
+
findingId: "Test string",
|
|
865
|
+
parent: "Test string",
|
|
866
|
+
}, {
|
|
867
|
+
access: {
|
|
868
|
+
callerIp: "Test string",
|
|
869
|
+
callerIpGeo: {
|
|
870
|
+
regionCode: "Test string",
|
|
871
|
+
},
|
|
872
|
+
methodName: "Test string",
|
|
873
|
+
principalEmail: "Test string",
|
|
874
|
+
principalSubject: "Test string",
|
|
875
|
+
serviceAccountDelegationInfo: [
|
|
876
|
+
{
|
|
877
|
+
principalEmail: "Test string",
|
|
878
|
+
principalSubject: "Test string",
|
|
879
|
+
}
|
|
880
|
+
],
|
|
881
|
+
serviceAccountKeyName: "Test string",
|
|
882
|
+
serviceName: "Test string",
|
|
883
|
+
userAgentFamily: "Test string",
|
|
884
|
+
},
|
|
885
|
+
canonicalName: "Test string",
|
|
886
|
+
category: "Test string",
|
|
887
|
+
compliances: [
|
|
888
|
+
{
|
|
889
|
+
ids: [
|
|
890
|
+
"Test string"
|
|
891
|
+
],
|
|
892
|
+
standard: "Test string",
|
|
893
|
+
version: "Test string",
|
|
894
|
+
}
|
|
895
|
+
],
|
|
896
|
+
connections: [
|
|
897
|
+
{
|
|
898
|
+
destinationIp: "Test string",
|
|
899
|
+
destinationPort: 42,
|
|
900
|
+
protocol: "Test string",
|
|
901
|
+
sourceIp: "Test string",
|
|
902
|
+
sourcePort: 42,
|
|
903
|
+
}
|
|
904
|
+
],
|
|
905
|
+
contacts: {
|
|
906
|
+
A: {
|
|
907
|
+
contacts: [
|
|
908
|
+
{
|
|
909
|
+
email: "Test string",
|
|
910
|
+
}
|
|
911
|
+
],
|
|
912
|
+
}
|
|
913
|
+
},
|
|
914
|
+
containers: [
|
|
915
|
+
{
|
|
916
|
+
imageId: "Test string",
|
|
917
|
+
labels: [
|
|
918
|
+
{
|
|
919
|
+
name: "Test string",
|
|
920
|
+
value: "Test string",
|
|
921
|
+
}
|
|
922
|
+
],
|
|
923
|
+
name: "Test string",
|
|
924
|
+
uri: "Test string",
|
|
925
|
+
}
|
|
926
|
+
],
|
|
927
|
+
createTime: "Test string",
|
|
928
|
+
database: {
|
|
929
|
+
displayName: "Test string",
|
|
930
|
+
grantees: [
|
|
931
|
+
"Test string"
|
|
932
|
+
],
|
|
933
|
+
name: "Test string",
|
|
934
|
+
query: "Test string",
|
|
935
|
+
userName: "Test string",
|
|
936
|
+
},
|
|
937
|
+
description: "Test string",
|
|
938
|
+
eventTime: "Test string",
|
|
939
|
+
exfiltration: {
|
|
940
|
+
sources: [
|
|
941
|
+
{
|
|
942
|
+
components: [
|
|
943
|
+
"Test string"
|
|
944
|
+
],
|
|
945
|
+
name: "Test string",
|
|
946
|
+
}
|
|
947
|
+
],
|
|
948
|
+
targets: [
|
|
949
|
+
{
|
|
950
|
+
components: [
|
|
951
|
+
"Test string"
|
|
952
|
+
],
|
|
953
|
+
name: "Test string",
|
|
954
|
+
}
|
|
955
|
+
],
|
|
956
|
+
},
|
|
957
|
+
externalSystems: {
|
|
958
|
+
A: {
|
|
959
|
+
assignees: [
|
|
960
|
+
"Test string"
|
|
961
|
+
],
|
|
962
|
+
externalSystemUpdateTime: "Test string",
|
|
963
|
+
externalUid: "Test string",
|
|
964
|
+
name: "Test string",
|
|
965
|
+
status: "Test string",
|
|
966
|
+
}
|
|
967
|
+
},
|
|
968
|
+
externalUri: "Test string",
|
|
969
|
+
findingClass: "Test string",
|
|
970
|
+
iamBindings: [
|
|
971
|
+
{
|
|
972
|
+
action: "Test string",
|
|
973
|
+
member: "Test string",
|
|
974
|
+
role: "Test string",
|
|
975
|
+
}
|
|
976
|
+
],
|
|
977
|
+
indicator: {
|
|
978
|
+
domains: [
|
|
979
|
+
"Test string"
|
|
980
|
+
],
|
|
981
|
+
ipAddresses: [
|
|
982
|
+
"Test string"
|
|
983
|
+
],
|
|
984
|
+
signatures: [
|
|
985
|
+
{
|
|
986
|
+
memoryHashSignature: {
|
|
987
|
+
binaryFamily: "Test string",
|
|
988
|
+
detections: [
|
|
989
|
+
{
|
|
990
|
+
binary: "Test string",
|
|
991
|
+
percentPagesMatched: 42,
|
|
992
|
+
}
|
|
993
|
+
],
|
|
994
|
+
},
|
|
995
|
+
yaraRuleSignature: {
|
|
996
|
+
yaraRule: "Test string",
|
|
997
|
+
},
|
|
998
|
+
}
|
|
999
|
+
],
|
|
1000
|
+
uris: [
|
|
1001
|
+
"Test string"
|
|
1002
|
+
],
|
|
1003
|
+
},
|
|
1004
|
+
kubernetes: {
|
|
1005
|
+
accessReviews: [
|
|
1006
|
+
{
|
|
1007
|
+
group: "Test string",
|
|
1008
|
+
name: "Test string",
|
|
1009
|
+
ns: "Test string",
|
|
1010
|
+
resource: "Test string",
|
|
1011
|
+
subresource: "Test string",
|
|
1012
|
+
verb: "Test string",
|
|
1013
|
+
version: "Test string",
|
|
1014
|
+
}
|
|
1015
|
+
],
|
|
1016
|
+
bindings: [
|
|
1017
|
+
{
|
|
1018
|
+
name: "Test string",
|
|
1019
|
+
ns: "Test string",
|
|
1020
|
+
role: {
|
|
1021
|
+
kind: "Test string",
|
|
1022
|
+
name: "Test string",
|
|
1023
|
+
ns: "Test string",
|
|
1024
|
+
},
|
|
1025
|
+
subjects: [
|
|
1026
|
+
{
|
|
1027
|
+
kind: "Test string",
|
|
1028
|
+
name: "Test string",
|
|
1029
|
+
ns: "Test string",
|
|
1030
|
+
}
|
|
1031
|
+
],
|
|
1032
|
+
}
|
|
1033
|
+
],
|
|
1034
|
+
nodePools: [
|
|
1035
|
+
{
|
|
1036
|
+
name: "Test string",
|
|
1037
|
+
nodes: [
|
|
1038
|
+
{
|
|
1039
|
+
name: "Test string",
|
|
1040
|
+
}
|
|
1041
|
+
],
|
|
1042
|
+
}
|
|
1043
|
+
],
|
|
1044
|
+
nodes: [
|
|
1045
|
+
{
|
|
1046
|
+
name: "Test string",
|
|
1047
|
+
}
|
|
1048
|
+
],
|
|
1049
|
+
pods: [
|
|
1050
|
+
{
|
|
1051
|
+
containers: [
|
|
1052
|
+
{
|
|
1053
|
+
imageId: "Test string",
|
|
1054
|
+
labels: [
|
|
1055
|
+
{
|
|
1056
|
+
name: "Test string",
|
|
1057
|
+
value: "Test string",
|
|
1058
|
+
}
|
|
1059
|
+
],
|
|
1060
|
+
name: "Test string",
|
|
1061
|
+
uri: "Test string",
|
|
1062
|
+
}
|
|
1063
|
+
],
|
|
1064
|
+
labels: [
|
|
1065
|
+
{
|
|
1066
|
+
name: "Test string",
|
|
1067
|
+
value: "Test string",
|
|
1068
|
+
}
|
|
1069
|
+
],
|
|
1070
|
+
name: "Test string",
|
|
1071
|
+
ns: "Test string",
|
|
1072
|
+
}
|
|
1073
|
+
],
|
|
1074
|
+
roles: [
|
|
1075
|
+
{
|
|
1076
|
+
kind: "Test string",
|
|
1077
|
+
name: "Test string",
|
|
1078
|
+
ns: "Test string",
|
|
1079
|
+
}
|
|
1080
|
+
],
|
|
1081
|
+
},
|
|
1082
|
+
mitreAttack: {
|
|
1083
|
+
additionalTactics: [
|
|
1084
|
+
"Test string"
|
|
1085
|
+
],
|
|
1086
|
+
additionalTechniques: [
|
|
1087
|
+
"Test string"
|
|
1088
|
+
],
|
|
1089
|
+
primaryTactic: "Test string",
|
|
1090
|
+
primaryTechniques: [
|
|
1091
|
+
"Test string"
|
|
1092
|
+
],
|
|
1093
|
+
version: "Test string",
|
|
1094
|
+
},
|
|
1095
|
+
mute: "Test string",
|
|
1096
|
+
muteInitiator: "Test string",
|
|
1097
|
+
muteUpdateTime: "Test string",
|
|
1098
|
+
name: "Test string",
|
|
1099
|
+
nextSteps: "Test string",
|
|
1100
|
+
parent: "Test string",
|
|
1101
|
+
processes: [
|
|
1102
|
+
{
|
|
1103
|
+
args: [
|
|
1104
|
+
"Test string"
|
|
1105
|
+
],
|
|
1106
|
+
argumentsTruncated: true,
|
|
1107
|
+
binary: {
|
|
1108
|
+
contents: "Test string",
|
|
1109
|
+
hashedSize: "Test string",
|
|
1110
|
+
partiallyHashed: true,
|
|
1111
|
+
path: "Test string",
|
|
1112
|
+
sha256: "Test string",
|
|
1113
|
+
size: "Test string",
|
|
1114
|
+
},
|
|
1115
|
+
envVariables: [
|
|
1116
|
+
{
|
|
1117
|
+
name: "Test string",
|
|
1118
|
+
val: "Test string",
|
|
1119
|
+
}
|
|
1120
|
+
],
|
|
1121
|
+
envVariablesTruncated: true,
|
|
1122
|
+
libraries: [
|
|
1123
|
+
{
|
|
1124
|
+
contents: "Test string",
|
|
1125
|
+
hashedSize: "Test string",
|
|
1126
|
+
partiallyHashed: true,
|
|
1127
|
+
path: "Test string",
|
|
1128
|
+
sha256: "Test string",
|
|
1129
|
+
size: "Test string",
|
|
1130
|
+
}
|
|
1131
|
+
],
|
|
1132
|
+
name: "Test string",
|
|
1133
|
+
parentPid: "Test string",
|
|
1134
|
+
pid: "Test string",
|
|
1135
|
+
script: {
|
|
1136
|
+
contents: "Test string",
|
|
1137
|
+
hashedSize: "Test string",
|
|
1138
|
+
partiallyHashed: true,
|
|
1139
|
+
path: "Test string",
|
|
1140
|
+
sha256: "Test string",
|
|
1141
|
+
size: "Test string",
|
|
1142
|
+
},
|
|
1143
|
+
}
|
|
1144
|
+
],
|
|
1145
|
+
resourceName: "Test string",
|
|
1146
|
+
securityMarks: {
|
|
1147
|
+
canonicalName: "Test string",
|
|
1148
|
+
marks: {
|
|
1149
|
+
A: "Test string"
|
|
1150
|
+
},
|
|
1151
|
+
name: "Test string",
|
|
1152
|
+
},
|
|
1153
|
+
severity: "Test string",
|
|
1154
|
+
sourceProperties: {
|
|
1155
|
+
A: 42
|
|
1156
|
+
},
|
|
1157
|
+
state: "Test string",
|
|
1158
|
+
vulnerability: {
|
|
1159
|
+
cve: {
|
|
1160
|
+
cvssv3: {
|
|
1161
|
+
attackComplexity: "Test string",
|
|
1162
|
+
attackVector: "Test string",
|
|
1163
|
+
availabilityImpact: "Test string",
|
|
1164
|
+
baseScore: 42,
|
|
1165
|
+
confidentialityImpact: "Test string",
|
|
1166
|
+
integrityImpact: "Test string",
|
|
1167
|
+
privilegesRequired: "Test string",
|
|
1168
|
+
scope: "Test string",
|
|
1169
|
+
userInteraction: "Test string",
|
|
1170
|
+
},
|
|
1171
|
+
id: "Test string",
|
|
1172
|
+
references: [
|
|
1173
|
+
{
|
|
1174
|
+
source: "Test string",
|
|
1175
|
+
uri: "Test string",
|
|
1176
|
+
}
|
|
1177
|
+
],
|
|
1178
|
+
upstreamFixAvailable: true,
|
|
1179
|
+
},
|
|
1180
|
+
},
|
|
1181
|
+
});
|
|
1182
|
+
/**
|
|
1183
|
+
* Filters an organization or source's findings and groups them by their specified properties. To group across all sources provide a `-` as the source id. Example:
|
|
1184
|
+
* /v1/organizations/{organization_id}/sources/-/findings, /v1/folders/{folder_id}/sources/-/findings, /v1/projects/{project_id}/sources/-/findings
|
|
1185
|
+
*/
|
|
1186
|
+
await gapi.client.securitycenter.organizations.sources.findings.group({
|
|
1187
|
+
parent: "Test string",
|
|
1188
|
+
}, {
|
|
1189
|
+
compareDuration: "Test string",
|
|
1190
|
+
filter: "Test string",
|
|
1191
|
+
groupBy: "Test string",
|
|
1192
|
+
pageSize: 42,
|
|
1193
|
+
pageToken: "Test string",
|
|
1194
|
+
readTime: "Test string",
|
|
1195
|
+
});
|
|
1196
|
+
/** Lists an organization or source's findings. To list across all sources provide a `-` as the source id. Example: /v1/organizations/{organization_id}/sources/-/findings */
|
|
1197
|
+
await gapi.client.securitycenter.organizations.sources.findings.list({
|
|
1198
|
+
compareDuration: "Test string",
|
|
1199
|
+
fieldMask: "Test string",
|
|
1200
|
+
filter: "Test string",
|
|
1201
|
+
orderBy: "Test string",
|
|
1202
|
+
pageSize: 42,
|
|
1203
|
+
pageToken: "Test string",
|
|
1204
|
+
parent: "Test string",
|
|
1205
|
+
readTime: "Test string",
|
|
1206
|
+
});
|
|
1207
|
+
/** Creates or updates a finding. The corresponding source must exist for a finding creation to succeed. */
|
|
1208
|
+
await gapi.client.securitycenter.organizations.sources.findings.patch({
|
|
1209
|
+
name: "Test string",
|
|
1210
|
+
updateMask: "Test string",
|
|
1211
|
+
}, {
|
|
1212
|
+
access: {
|
|
1213
|
+
callerIp: "Test string",
|
|
1214
|
+
callerIpGeo: {
|
|
1215
|
+
regionCode: "Test string",
|
|
1216
|
+
},
|
|
1217
|
+
methodName: "Test string",
|
|
1218
|
+
principalEmail: "Test string",
|
|
1219
|
+
principalSubject: "Test string",
|
|
1220
|
+
serviceAccountDelegationInfo: [
|
|
1221
|
+
{
|
|
1222
|
+
principalEmail: "Test string",
|
|
1223
|
+
principalSubject: "Test string",
|
|
1224
|
+
}
|
|
1225
|
+
],
|
|
1226
|
+
serviceAccountKeyName: "Test string",
|
|
1227
|
+
serviceName: "Test string",
|
|
1228
|
+
userAgentFamily: "Test string",
|
|
1229
|
+
},
|
|
1230
|
+
canonicalName: "Test string",
|
|
1231
|
+
category: "Test string",
|
|
1232
|
+
compliances: [
|
|
1233
|
+
{
|
|
1234
|
+
ids: [
|
|
1235
|
+
"Test string"
|
|
1236
|
+
],
|
|
1237
|
+
standard: "Test string",
|
|
1238
|
+
version: "Test string",
|
|
1239
|
+
}
|
|
1240
|
+
],
|
|
1241
|
+
connections: [
|
|
1242
|
+
{
|
|
1243
|
+
destinationIp: "Test string",
|
|
1244
|
+
destinationPort: 42,
|
|
1245
|
+
protocol: "Test string",
|
|
1246
|
+
sourceIp: "Test string",
|
|
1247
|
+
sourcePort: 42,
|
|
1248
|
+
}
|
|
1249
|
+
],
|
|
1250
|
+
contacts: {
|
|
1251
|
+
A: {
|
|
1252
|
+
contacts: [
|
|
1253
|
+
{
|
|
1254
|
+
email: "Test string",
|
|
1255
|
+
}
|
|
1256
|
+
],
|
|
1257
|
+
}
|
|
1258
|
+
},
|
|
1259
|
+
containers: [
|
|
1260
|
+
{
|
|
1261
|
+
imageId: "Test string",
|
|
1262
|
+
labels: [
|
|
1263
|
+
{
|
|
1264
|
+
name: "Test string",
|
|
1265
|
+
value: "Test string",
|
|
1266
|
+
}
|
|
1267
|
+
],
|
|
1268
|
+
name: "Test string",
|
|
1269
|
+
uri: "Test string",
|
|
1270
|
+
}
|
|
1271
|
+
],
|
|
1272
|
+
createTime: "Test string",
|
|
1273
|
+
database: {
|
|
1274
|
+
displayName: "Test string",
|
|
1275
|
+
grantees: [
|
|
1276
|
+
"Test string"
|
|
1277
|
+
],
|
|
1278
|
+
name: "Test string",
|
|
1279
|
+
query: "Test string",
|
|
1280
|
+
userName: "Test string",
|
|
1281
|
+
},
|
|
1282
|
+
description: "Test string",
|
|
1283
|
+
eventTime: "Test string",
|
|
1284
|
+
exfiltration: {
|
|
1285
|
+
sources: [
|
|
1286
|
+
{
|
|
1287
|
+
components: [
|
|
1288
|
+
"Test string"
|
|
1289
|
+
],
|
|
1290
|
+
name: "Test string",
|
|
1291
|
+
}
|
|
1292
|
+
],
|
|
1293
|
+
targets: [
|
|
1294
|
+
{
|
|
1295
|
+
components: [
|
|
1296
|
+
"Test string"
|
|
1297
|
+
],
|
|
1298
|
+
name: "Test string",
|
|
1299
|
+
}
|
|
1300
|
+
],
|
|
1301
|
+
},
|
|
1302
|
+
externalSystems: {
|
|
1303
|
+
A: {
|
|
1304
|
+
assignees: [
|
|
1305
|
+
"Test string"
|
|
1306
|
+
],
|
|
1307
|
+
externalSystemUpdateTime: "Test string",
|
|
1308
|
+
externalUid: "Test string",
|
|
1309
|
+
name: "Test string",
|
|
1310
|
+
status: "Test string",
|
|
1311
|
+
}
|
|
1312
|
+
},
|
|
1313
|
+
externalUri: "Test string",
|
|
1314
|
+
findingClass: "Test string",
|
|
1315
|
+
iamBindings: [
|
|
1316
|
+
{
|
|
1317
|
+
action: "Test string",
|
|
1318
|
+
member: "Test string",
|
|
1319
|
+
role: "Test string",
|
|
1320
|
+
}
|
|
1321
|
+
],
|
|
1322
|
+
indicator: {
|
|
1323
|
+
domains: [
|
|
1324
|
+
"Test string"
|
|
1325
|
+
],
|
|
1326
|
+
ipAddresses: [
|
|
1327
|
+
"Test string"
|
|
1328
|
+
],
|
|
1329
|
+
signatures: [
|
|
1330
|
+
{
|
|
1331
|
+
memoryHashSignature: {
|
|
1332
|
+
binaryFamily: "Test string",
|
|
1333
|
+
detections: [
|
|
1334
|
+
{
|
|
1335
|
+
binary: "Test string",
|
|
1336
|
+
percentPagesMatched: 42,
|
|
1337
|
+
}
|
|
1338
|
+
],
|
|
1339
|
+
},
|
|
1340
|
+
yaraRuleSignature: {
|
|
1341
|
+
yaraRule: "Test string",
|
|
1342
|
+
},
|
|
1343
|
+
}
|
|
1344
|
+
],
|
|
1345
|
+
uris: [
|
|
1346
|
+
"Test string"
|
|
1347
|
+
],
|
|
1348
|
+
},
|
|
1349
|
+
kubernetes: {
|
|
1350
|
+
accessReviews: [
|
|
1351
|
+
{
|
|
1352
|
+
group: "Test string",
|
|
1353
|
+
name: "Test string",
|
|
1354
|
+
ns: "Test string",
|
|
1355
|
+
resource: "Test string",
|
|
1356
|
+
subresource: "Test string",
|
|
1357
|
+
verb: "Test string",
|
|
1358
|
+
version: "Test string",
|
|
1359
|
+
}
|
|
1360
|
+
],
|
|
1361
|
+
bindings: [
|
|
1362
|
+
{
|
|
1363
|
+
name: "Test string",
|
|
1364
|
+
ns: "Test string",
|
|
1365
|
+
role: {
|
|
1366
|
+
kind: "Test string",
|
|
1367
|
+
name: "Test string",
|
|
1368
|
+
ns: "Test string",
|
|
1369
|
+
},
|
|
1370
|
+
subjects: [
|
|
1371
|
+
{
|
|
1372
|
+
kind: "Test string",
|
|
1373
|
+
name: "Test string",
|
|
1374
|
+
ns: "Test string",
|
|
1375
|
+
}
|
|
1376
|
+
],
|
|
1377
|
+
}
|
|
1378
|
+
],
|
|
1379
|
+
nodePools: [
|
|
1380
|
+
{
|
|
1381
|
+
name: "Test string",
|
|
1382
|
+
nodes: [
|
|
1383
|
+
{
|
|
1384
|
+
name: "Test string",
|
|
1385
|
+
}
|
|
1386
|
+
],
|
|
1387
|
+
}
|
|
1388
|
+
],
|
|
1389
|
+
nodes: [
|
|
1390
|
+
{
|
|
1391
|
+
name: "Test string",
|
|
1392
|
+
}
|
|
1393
|
+
],
|
|
1394
|
+
pods: [
|
|
1395
|
+
{
|
|
1396
|
+
containers: [
|
|
1397
|
+
{
|
|
1398
|
+
imageId: "Test string",
|
|
1399
|
+
labels: [
|
|
1400
|
+
{
|
|
1401
|
+
name: "Test string",
|
|
1402
|
+
value: "Test string",
|
|
1403
|
+
}
|
|
1404
|
+
],
|
|
1405
|
+
name: "Test string",
|
|
1406
|
+
uri: "Test string",
|
|
1407
|
+
}
|
|
1408
|
+
],
|
|
1409
|
+
labels: [
|
|
1410
|
+
{
|
|
1411
|
+
name: "Test string",
|
|
1412
|
+
value: "Test string",
|
|
1413
|
+
}
|
|
1414
|
+
],
|
|
1415
|
+
name: "Test string",
|
|
1416
|
+
ns: "Test string",
|
|
1417
|
+
}
|
|
1418
|
+
],
|
|
1419
|
+
roles: [
|
|
1420
|
+
{
|
|
1421
|
+
kind: "Test string",
|
|
1422
|
+
name: "Test string",
|
|
1423
|
+
ns: "Test string",
|
|
1424
|
+
}
|
|
1425
|
+
],
|
|
1426
|
+
},
|
|
1427
|
+
mitreAttack: {
|
|
1428
|
+
additionalTactics: [
|
|
1429
|
+
"Test string"
|
|
1430
|
+
],
|
|
1431
|
+
additionalTechniques: [
|
|
1432
|
+
"Test string"
|
|
1433
|
+
],
|
|
1434
|
+
primaryTactic: "Test string",
|
|
1435
|
+
primaryTechniques: [
|
|
1436
|
+
"Test string"
|
|
1437
|
+
],
|
|
1438
|
+
version: "Test string",
|
|
1439
|
+
},
|
|
1440
|
+
mute: "Test string",
|
|
1441
|
+
muteInitiator: "Test string",
|
|
1442
|
+
muteUpdateTime: "Test string",
|
|
1443
|
+
name: "Test string",
|
|
1444
|
+
nextSteps: "Test string",
|
|
1445
|
+
parent: "Test string",
|
|
1446
|
+
processes: [
|
|
1447
|
+
{
|
|
1448
|
+
args: [
|
|
1449
|
+
"Test string"
|
|
1450
|
+
],
|
|
1451
|
+
argumentsTruncated: true,
|
|
1452
|
+
binary: {
|
|
1453
|
+
contents: "Test string",
|
|
1454
|
+
hashedSize: "Test string",
|
|
1455
|
+
partiallyHashed: true,
|
|
1456
|
+
path: "Test string",
|
|
1457
|
+
sha256: "Test string",
|
|
1458
|
+
size: "Test string",
|
|
1459
|
+
},
|
|
1460
|
+
envVariables: [
|
|
1461
|
+
{
|
|
1462
|
+
name: "Test string",
|
|
1463
|
+
val: "Test string",
|
|
1464
|
+
}
|
|
1465
|
+
],
|
|
1466
|
+
envVariablesTruncated: true,
|
|
1467
|
+
libraries: [
|
|
1468
|
+
{
|
|
1469
|
+
contents: "Test string",
|
|
1470
|
+
hashedSize: "Test string",
|
|
1471
|
+
partiallyHashed: true,
|
|
1472
|
+
path: "Test string",
|
|
1473
|
+
sha256: "Test string",
|
|
1474
|
+
size: "Test string",
|
|
1475
|
+
}
|
|
1476
|
+
],
|
|
1477
|
+
name: "Test string",
|
|
1478
|
+
parentPid: "Test string",
|
|
1479
|
+
pid: "Test string",
|
|
1480
|
+
script: {
|
|
1481
|
+
contents: "Test string",
|
|
1482
|
+
hashedSize: "Test string",
|
|
1483
|
+
partiallyHashed: true,
|
|
1484
|
+
path: "Test string",
|
|
1485
|
+
sha256: "Test string",
|
|
1486
|
+
size: "Test string",
|
|
1487
|
+
},
|
|
1488
|
+
}
|
|
1489
|
+
],
|
|
1490
|
+
resourceName: "Test string",
|
|
1491
|
+
securityMarks: {
|
|
1492
|
+
canonicalName: "Test string",
|
|
1493
|
+
marks: {
|
|
1494
|
+
A: "Test string"
|
|
1495
|
+
},
|
|
1496
|
+
name: "Test string",
|
|
1497
|
+
},
|
|
1498
|
+
severity: "Test string",
|
|
1499
|
+
sourceProperties: {
|
|
1500
|
+
A: 42
|
|
1501
|
+
},
|
|
1502
|
+
state: "Test string",
|
|
1503
|
+
vulnerability: {
|
|
1504
|
+
cve: {
|
|
1505
|
+
cvssv3: {
|
|
1506
|
+
attackComplexity: "Test string",
|
|
1507
|
+
attackVector: "Test string",
|
|
1508
|
+
availabilityImpact: "Test string",
|
|
1509
|
+
baseScore: 42,
|
|
1510
|
+
confidentialityImpact: "Test string",
|
|
1511
|
+
integrityImpact: "Test string",
|
|
1512
|
+
privilegesRequired: "Test string",
|
|
1513
|
+
scope: "Test string",
|
|
1514
|
+
userInteraction: "Test string",
|
|
1515
|
+
},
|
|
1516
|
+
id: "Test string",
|
|
1517
|
+
references: [
|
|
1518
|
+
{
|
|
1519
|
+
source: "Test string",
|
|
1520
|
+
uri: "Test string",
|
|
1521
|
+
}
|
|
1522
|
+
],
|
|
1523
|
+
upstreamFixAvailable: true,
|
|
1524
|
+
},
|
|
1525
|
+
},
|
|
1526
|
+
});
|
|
1527
|
+
/** Updates the mute state of a finding. */
|
|
1528
|
+
await gapi.client.securitycenter.organizations.sources.findings.setMute({
|
|
1529
|
+
name: "Test string",
|
|
1530
|
+
}, {
|
|
1531
|
+
mute: "Test string",
|
|
1532
|
+
});
|
|
1533
|
+
/** Updates the state of a finding. */
|
|
1534
|
+
await gapi.client.securitycenter.organizations.sources.findings.setState({
|
|
1535
|
+
name: "Test string",
|
|
1536
|
+
}, {
|
|
1537
|
+
startTime: "Test string",
|
|
1538
|
+
state: "Test string",
|
|
1539
|
+
});
|
|
1540
|
+
/** Updates security marks. */
|
|
1541
|
+
await gapi.client.securitycenter.organizations.sources.findings.updateSecurityMarks({
|
|
1542
|
+
name: "Test string",
|
|
1543
|
+
startTime: "Test string",
|
|
1544
|
+
updateMask: "Test string",
|
|
1545
|
+
}, {
|
|
1546
|
+
canonicalName: "Test string",
|
|
1547
|
+
marks: {
|
|
1548
|
+
A: "Test string"
|
|
1549
|
+
},
|
|
1550
|
+
name: "Test string",
|
|
1551
|
+
});
|
|
1552
|
+
/** Updates external system. This is for a given finding. */
|
|
1553
|
+
await gapi.client.securitycenter.organizations.sources.findings.externalSystems.patch({
|
|
1554
|
+
name: "Test string",
|
|
1555
|
+
updateMask: "Test string",
|
|
1556
|
+
}, {
|
|
1557
|
+
assignees: [
|
|
1558
|
+
"Test string"
|
|
1559
|
+
],
|
|
1560
|
+
externalSystemUpdateTime: "Test string",
|
|
1561
|
+
externalUid: "Test string",
|
|
1562
|
+
name: "Test string",
|
|
1563
|
+
status: "Test string",
|
|
1564
|
+
});
|
|
1565
|
+
/** Filters an organization's assets and groups them by their specified properties. */
|
|
1566
|
+
await gapi.client.securitycenter.projects.assets.group({
|
|
1567
|
+
parent: "Test string",
|
|
1568
|
+
}, {
|
|
1569
|
+
compareDuration: "Test string",
|
|
1570
|
+
filter: "Test string",
|
|
1571
|
+
groupBy: "Test string",
|
|
1572
|
+
pageSize: 42,
|
|
1573
|
+
pageToken: "Test string",
|
|
1574
|
+
readTime: "Test string",
|
|
1575
|
+
});
|
|
1576
|
+
/** Lists an organization's assets. */
|
|
1577
|
+
await gapi.client.securitycenter.projects.assets.list({
|
|
1578
|
+
compareDuration: "Test string",
|
|
1579
|
+
fieldMask: "Test string",
|
|
1580
|
+
filter: "Test string",
|
|
1581
|
+
orderBy: "Test string",
|
|
1582
|
+
pageSize: 42,
|
|
1583
|
+
pageToken: "Test string",
|
|
1584
|
+
parent: "Test string",
|
|
1585
|
+
readTime: "Test string",
|
|
1586
|
+
});
|
|
1587
|
+
/** Updates security marks. */
|
|
1588
|
+
await gapi.client.securitycenter.projects.assets.updateSecurityMarks({
|
|
1589
|
+
name: "Test string",
|
|
1590
|
+
startTime: "Test string",
|
|
1591
|
+
updateMask: "Test string",
|
|
1592
|
+
}, {
|
|
1593
|
+
canonicalName: "Test string",
|
|
1594
|
+
marks: {
|
|
1595
|
+
A: "Test string"
|
|
1596
|
+
},
|
|
1597
|
+
name: "Test string",
|
|
1598
|
+
});
|
|
1599
|
+
/** Creates a big query export. */
|
|
1600
|
+
await gapi.client.securitycenter.projects.bigQueryExports.create({
|
|
1601
|
+
bigQueryExportId: "Test string",
|
|
1602
|
+
parent: "Test string",
|
|
1603
|
+
}, {
|
|
1604
|
+
createTime: "Test string",
|
|
1605
|
+
dataset: "Test string",
|
|
1606
|
+
description: "Test string",
|
|
1607
|
+
filter: "Test string",
|
|
1608
|
+
mostRecentEditor: "Test string",
|
|
1609
|
+
name: "Test string",
|
|
1610
|
+
principal: "Test string",
|
|
1611
|
+
updateTime: "Test string",
|
|
1612
|
+
});
|
|
1613
|
+
/** Deletes an existing big query export. */
|
|
1614
|
+
await gapi.client.securitycenter.projects.bigQueryExports.delete({
|
|
1615
|
+
name: "Test string",
|
|
1616
|
+
});
|
|
1617
|
+
/** Gets a big query export. */
|
|
1618
|
+
await gapi.client.securitycenter.projects.bigQueryExports.get({
|
|
1619
|
+
name: "Test string",
|
|
1620
|
+
});
|
|
1621
|
+
/**
|
|
1622
|
+
* Lists BigQuery exports. Note that when requesting BigQuery exports at a given level all exports under that level are also returned e.g. if requesting BigQuery exports under a folder,
|
|
1623
|
+
* then all BigQuery exports immediately under the folder plus the ones created under the projects within the folder are returned.
|
|
1624
|
+
*/
|
|
1625
|
+
await gapi.client.securitycenter.projects.bigQueryExports.list({
|
|
1626
|
+
pageSize: 42,
|
|
1627
|
+
pageToken: "Test string",
|
|
1628
|
+
parent: "Test string",
|
|
1629
|
+
});
|
|
1630
|
+
/** Updates a BigQuery export. */
|
|
1631
|
+
await gapi.client.securitycenter.projects.bigQueryExports.patch({
|
|
1632
|
+
name: "Test string",
|
|
1633
|
+
updateMask: "Test string",
|
|
1634
|
+
}, {
|
|
1635
|
+
createTime: "Test string",
|
|
1636
|
+
dataset: "Test string",
|
|
1637
|
+
description: "Test string",
|
|
1638
|
+
filter: "Test string",
|
|
1639
|
+
mostRecentEditor: "Test string",
|
|
1640
|
+
name: "Test string",
|
|
1641
|
+
principal: "Test string",
|
|
1642
|
+
updateTime: "Test string",
|
|
1643
|
+
});
|
|
1644
|
+
/**
|
|
1645
|
+
* Kicks off an LRO to bulk mute findings for a parent based on a filter. The parent can be either an organization, folder or project. The findings matched by the filter will be muted
|
|
1646
|
+
* after the LRO is done.
|
|
1647
|
+
*/
|
|
1648
|
+
await gapi.client.securitycenter.projects.findings.bulkMute({
|
|
1649
|
+
parent: "Test string",
|
|
1650
|
+
}, {
|
|
1651
|
+
filter: "Test string",
|
|
1652
|
+
muteAnnotation: "Test string",
|
|
1653
|
+
});
|
|
1654
|
+
/** Creates a mute config. */
|
|
1655
|
+
await gapi.client.securitycenter.projects.muteConfigs.create({
|
|
1656
|
+
muteConfigId: "Test string",
|
|
1657
|
+
parent: "Test string",
|
|
1658
|
+
}, {
|
|
1659
|
+
createTime: "Test string",
|
|
1660
|
+
description: "Test string",
|
|
1661
|
+
displayName: "Test string",
|
|
1662
|
+
filter: "Test string",
|
|
1663
|
+
mostRecentEditor: "Test string",
|
|
1664
|
+
name: "Test string",
|
|
1665
|
+
updateTime: "Test string",
|
|
1666
|
+
});
|
|
1667
|
+
/** Deletes an existing mute config. */
|
|
1668
|
+
await gapi.client.securitycenter.projects.muteConfigs.delete({
|
|
1669
|
+
name: "Test string",
|
|
1670
|
+
});
|
|
1671
|
+
/** Gets a mute config. */
|
|
1672
|
+
await gapi.client.securitycenter.projects.muteConfigs.get({
|
|
1673
|
+
name: "Test string",
|
|
1674
|
+
});
|
|
1675
|
+
/** Lists mute configs. */
|
|
1676
|
+
await gapi.client.securitycenter.projects.muteConfigs.list({
|
|
1677
|
+
pageSize: 42,
|
|
1678
|
+
pageToken: "Test string",
|
|
1679
|
+
parent: "Test string",
|
|
1680
|
+
});
|
|
1681
|
+
/** Updates a mute config. */
|
|
1682
|
+
await gapi.client.securitycenter.projects.muteConfigs.patch({
|
|
1683
|
+
name: "Test string",
|
|
1684
|
+
updateMask: "Test string",
|
|
1685
|
+
}, {
|
|
1686
|
+
createTime: "Test string",
|
|
1687
|
+
description: "Test string",
|
|
1688
|
+
displayName: "Test string",
|
|
1689
|
+
filter: "Test string",
|
|
1690
|
+
mostRecentEditor: "Test string",
|
|
1691
|
+
name: "Test string",
|
|
1692
|
+
updateTime: "Test string",
|
|
1693
|
+
});
|
|
1694
|
+
/** Lists all sources belonging to an organization. */
|
|
1695
|
+
await gapi.client.securitycenter.projects.sources.list({
|
|
1696
|
+
pageSize: 42,
|
|
1697
|
+
pageToken: "Test string",
|
|
1698
|
+
parent: "Test string",
|
|
1699
|
+
});
|
|
1700
|
+
/**
|
|
1701
|
+
* Filters an organization or source's findings and groups them by their specified properties. To group across all sources provide a `-` as the source id. Example:
|
|
1702
|
+
* /v1/organizations/{organization_id}/sources/-/findings, /v1/folders/{folder_id}/sources/-/findings, /v1/projects/{project_id}/sources/-/findings
|
|
1703
|
+
*/
|
|
1704
|
+
await gapi.client.securitycenter.projects.sources.findings.group({
|
|
1705
|
+
parent: "Test string",
|
|
1706
|
+
}, {
|
|
1707
|
+
compareDuration: "Test string",
|
|
1708
|
+
filter: "Test string",
|
|
1709
|
+
groupBy: "Test string",
|
|
1710
|
+
pageSize: 42,
|
|
1711
|
+
pageToken: "Test string",
|
|
1712
|
+
readTime: "Test string",
|
|
1713
|
+
});
|
|
1714
|
+
/** Lists an organization or source's findings. To list across all sources provide a `-` as the source id. Example: /v1/organizations/{organization_id}/sources/-/findings */
|
|
1715
|
+
await gapi.client.securitycenter.projects.sources.findings.list({
|
|
1716
|
+
compareDuration: "Test string",
|
|
1717
|
+
fieldMask: "Test string",
|
|
1718
|
+
filter: "Test string",
|
|
1719
|
+
orderBy: "Test string",
|
|
1720
|
+
pageSize: 42,
|
|
1721
|
+
pageToken: "Test string",
|
|
1722
|
+
parent: "Test string",
|
|
1723
|
+
readTime: "Test string",
|
|
1724
|
+
});
|
|
1725
|
+
/** Creates or updates a finding. The corresponding source must exist for a finding creation to succeed. */
|
|
1726
|
+
await gapi.client.securitycenter.projects.sources.findings.patch({
|
|
1727
|
+
name: "Test string",
|
|
1728
|
+
updateMask: "Test string",
|
|
1729
|
+
}, {
|
|
1730
|
+
access: {
|
|
1731
|
+
callerIp: "Test string",
|
|
1732
|
+
callerIpGeo: {
|
|
1733
|
+
regionCode: "Test string",
|
|
1734
|
+
},
|
|
1735
|
+
methodName: "Test string",
|
|
1736
|
+
principalEmail: "Test string",
|
|
1737
|
+
principalSubject: "Test string",
|
|
1738
|
+
serviceAccountDelegationInfo: [
|
|
1739
|
+
{
|
|
1740
|
+
principalEmail: "Test string",
|
|
1741
|
+
principalSubject: "Test string",
|
|
1742
|
+
}
|
|
1743
|
+
],
|
|
1744
|
+
serviceAccountKeyName: "Test string",
|
|
1745
|
+
serviceName: "Test string",
|
|
1746
|
+
userAgentFamily: "Test string",
|
|
1747
|
+
},
|
|
1748
|
+
canonicalName: "Test string",
|
|
1749
|
+
category: "Test string",
|
|
1750
|
+
compliances: [
|
|
1751
|
+
{
|
|
1752
|
+
ids: [
|
|
1753
|
+
"Test string"
|
|
1754
|
+
],
|
|
1755
|
+
standard: "Test string",
|
|
1756
|
+
version: "Test string",
|
|
1757
|
+
}
|
|
1758
|
+
],
|
|
1759
|
+
connections: [
|
|
1760
|
+
{
|
|
1761
|
+
destinationIp: "Test string",
|
|
1762
|
+
destinationPort: 42,
|
|
1763
|
+
protocol: "Test string",
|
|
1764
|
+
sourceIp: "Test string",
|
|
1765
|
+
sourcePort: 42,
|
|
1766
|
+
}
|
|
1767
|
+
],
|
|
1768
|
+
contacts: {
|
|
1769
|
+
A: {
|
|
1770
|
+
contacts: [
|
|
1771
|
+
{
|
|
1772
|
+
email: "Test string",
|
|
1773
|
+
}
|
|
1774
|
+
],
|
|
1775
|
+
}
|
|
1776
|
+
},
|
|
1777
|
+
containers: [
|
|
1778
|
+
{
|
|
1779
|
+
imageId: "Test string",
|
|
1780
|
+
labels: [
|
|
1781
|
+
{
|
|
1782
|
+
name: "Test string",
|
|
1783
|
+
value: "Test string",
|
|
1784
|
+
}
|
|
1785
|
+
],
|
|
1786
|
+
name: "Test string",
|
|
1787
|
+
uri: "Test string",
|
|
1788
|
+
}
|
|
1789
|
+
],
|
|
1790
|
+
createTime: "Test string",
|
|
1791
|
+
database: {
|
|
1792
|
+
displayName: "Test string",
|
|
1793
|
+
grantees: [
|
|
1794
|
+
"Test string"
|
|
1795
|
+
],
|
|
1796
|
+
name: "Test string",
|
|
1797
|
+
query: "Test string",
|
|
1798
|
+
userName: "Test string",
|
|
1799
|
+
},
|
|
1800
|
+
description: "Test string",
|
|
1801
|
+
eventTime: "Test string",
|
|
1802
|
+
exfiltration: {
|
|
1803
|
+
sources: [
|
|
1804
|
+
{
|
|
1805
|
+
components: [
|
|
1806
|
+
"Test string"
|
|
1807
|
+
],
|
|
1808
|
+
name: "Test string",
|
|
1809
|
+
}
|
|
1810
|
+
],
|
|
1811
|
+
targets: [
|
|
1812
|
+
{
|
|
1813
|
+
components: [
|
|
1814
|
+
"Test string"
|
|
1815
|
+
],
|
|
1816
|
+
name: "Test string",
|
|
1817
|
+
}
|
|
1818
|
+
],
|
|
1819
|
+
},
|
|
1820
|
+
externalSystems: {
|
|
1821
|
+
A: {
|
|
1822
|
+
assignees: [
|
|
1823
|
+
"Test string"
|
|
1824
|
+
],
|
|
1825
|
+
externalSystemUpdateTime: "Test string",
|
|
1826
|
+
externalUid: "Test string",
|
|
1827
|
+
name: "Test string",
|
|
1828
|
+
status: "Test string",
|
|
1829
|
+
}
|
|
1830
|
+
},
|
|
1831
|
+
externalUri: "Test string",
|
|
1832
|
+
findingClass: "Test string",
|
|
1833
|
+
iamBindings: [
|
|
1834
|
+
{
|
|
1835
|
+
action: "Test string",
|
|
1836
|
+
member: "Test string",
|
|
1837
|
+
role: "Test string",
|
|
1838
|
+
}
|
|
1839
|
+
],
|
|
1840
|
+
indicator: {
|
|
1841
|
+
domains: [
|
|
1842
|
+
"Test string"
|
|
1843
|
+
],
|
|
1844
|
+
ipAddresses: [
|
|
1845
|
+
"Test string"
|
|
1846
|
+
],
|
|
1847
|
+
signatures: [
|
|
1848
|
+
{
|
|
1849
|
+
memoryHashSignature: {
|
|
1850
|
+
binaryFamily: "Test string",
|
|
1851
|
+
detections: [
|
|
1852
|
+
{
|
|
1853
|
+
binary: "Test string",
|
|
1854
|
+
percentPagesMatched: 42,
|
|
1855
|
+
}
|
|
1856
|
+
],
|
|
1857
|
+
},
|
|
1858
|
+
yaraRuleSignature: {
|
|
1859
|
+
yaraRule: "Test string",
|
|
1860
|
+
},
|
|
1861
|
+
}
|
|
1862
|
+
],
|
|
1863
|
+
uris: [
|
|
1864
|
+
"Test string"
|
|
1865
|
+
],
|
|
1866
|
+
},
|
|
1867
|
+
kubernetes: {
|
|
1868
|
+
accessReviews: [
|
|
1869
|
+
{
|
|
1870
|
+
group: "Test string",
|
|
1871
|
+
name: "Test string",
|
|
1872
|
+
ns: "Test string",
|
|
1873
|
+
resource: "Test string",
|
|
1874
|
+
subresource: "Test string",
|
|
1875
|
+
verb: "Test string",
|
|
1876
|
+
version: "Test string",
|
|
1877
|
+
}
|
|
1878
|
+
],
|
|
1879
|
+
bindings: [
|
|
1880
|
+
{
|
|
1881
|
+
name: "Test string",
|
|
1882
|
+
ns: "Test string",
|
|
1883
|
+
role: {
|
|
1884
|
+
kind: "Test string",
|
|
1885
|
+
name: "Test string",
|
|
1886
|
+
ns: "Test string",
|
|
1887
|
+
},
|
|
1888
|
+
subjects: [
|
|
1889
|
+
{
|
|
1890
|
+
kind: "Test string",
|
|
1891
|
+
name: "Test string",
|
|
1892
|
+
ns: "Test string",
|
|
1893
|
+
}
|
|
1894
|
+
],
|
|
1895
|
+
}
|
|
1896
|
+
],
|
|
1897
|
+
nodePools: [
|
|
1898
|
+
{
|
|
1899
|
+
name: "Test string",
|
|
1900
|
+
nodes: [
|
|
1901
|
+
{
|
|
1902
|
+
name: "Test string",
|
|
1903
|
+
}
|
|
1904
|
+
],
|
|
1905
|
+
}
|
|
1906
|
+
],
|
|
1907
|
+
nodes: [
|
|
1908
|
+
{
|
|
1909
|
+
name: "Test string",
|
|
1910
|
+
}
|
|
1911
|
+
],
|
|
1912
|
+
pods: [
|
|
1913
|
+
{
|
|
1914
|
+
containers: [
|
|
1915
|
+
{
|
|
1916
|
+
imageId: "Test string",
|
|
1917
|
+
labels: [
|
|
1918
|
+
{
|
|
1919
|
+
name: "Test string",
|
|
1920
|
+
value: "Test string",
|
|
1921
|
+
}
|
|
1922
|
+
],
|
|
1923
|
+
name: "Test string",
|
|
1924
|
+
uri: "Test string",
|
|
1925
|
+
}
|
|
1926
|
+
],
|
|
1927
|
+
labels: [
|
|
1928
|
+
{
|
|
1929
|
+
name: "Test string",
|
|
1930
|
+
value: "Test string",
|
|
1931
|
+
}
|
|
1932
|
+
],
|
|
1933
|
+
name: "Test string",
|
|
1934
|
+
ns: "Test string",
|
|
1935
|
+
}
|
|
1936
|
+
],
|
|
1937
|
+
roles: [
|
|
1938
|
+
{
|
|
1939
|
+
kind: "Test string",
|
|
1940
|
+
name: "Test string",
|
|
1941
|
+
ns: "Test string",
|
|
1942
|
+
}
|
|
1943
|
+
],
|
|
1944
|
+
},
|
|
1945
|
+
mitreAttack: {
|
|
1946
|
+
additionalTactics: [
|
|
1947
|
+
"Test string"
|
|
1948
|
+
],
|
|
1949
|
+
additionalTechniques: [
|
|
1950
|
+
"Test string"
|
|
1951
|
+
],
|
|
1952
|
+
primaryTactic: "Test string",
|
|
1953
|
+
primaryTechniques: [
|
|
1954
|
+
"Test string"
|
|
1955
|
+
],
|
|
1956
|
+
version: "Test string",
|
|
1957
|
+
},
|
|
1958
|
+
mute: "Test string",
|
|
1959
|
+
muteInitiator: "Test string",
|
|
1960
|
+
muteUpdateTime: "Test string",
|
|
1961
|
+
name: "Test string",
|
|
1962
|
+
nextSteps: "Test string",
|
|
1963
|
+
parent: "Test string",
|
|
1964
|
+
processes: [
|
|
1965
|
+
{
|
|
1966
|
+
args: [
|
|
1967
|
+
"Test string"
|
|
1968
|
+
],
|
|
1969
|
+
argumentsTruncated: true,
|
|
1970
|
+
binary: {
|
|
1971
|
+
contents: "Test string",
|
|
1972
|
+
hashedSize: "Test string",
|
|
1973
|
+
partiallyHashed: true,
|
|
1974
|
+
path: "Test string",
|
|
1975
|
+
sha256: "Test string",
|
|
1976
|
+
size: "Test string",
|
|
1977
|
+
},
|
|
1978
|
+
envVariables: [
|
|
1979
|
+
{
|
|
1980
|
+
name: "Test string",
|
|
1981
|
+
val: "Test string",
|
|
1982
|
+
}
|
|
1983
|
+
],
|
|
1984
|
+
envVariablesTruncated: true,
|
|
1985
|
+
libraries: [
|
|
1986
|
+
{
|
|
1987
|
+
contents: "Test string",
|
|
1988
|
+
hashedSize: "Test string",
|
|
1989
|
+
partiallyHashed: true,
|
|
1990
|
+
path: "Test string",
|
|
1991
|
+
sha256: "Test string",
|
|
1992
|
+
size: "Test string",
|
|
1993
|
+
}
|
|
1994
|
+
],
|
|
1995
|
+
name: "Test string",
|
|
1996
|
+
parentPid: "Test string",
|
|
1997
|
+
pid: "Test string",
|
|
1998
|
+
script: {
|
|
1999
|
+
contents: "Test string",
|
|
2000
|
+
hashedSize: "Test string",
|
|
2001
|
+
partiallyHashed: true,
|
|
2002
|
+
path: "Test string",
|
|
2003
|
+
sha256: "Test string",
|
|
2004
|
+
size: "Test string",
|
|
2005
|
+
},
|
|
2006
|
+
}
|
|
2007
|
+
],
|
|
2008
|
+
resourceName: "Test string",
|
|
2009
|
+
securityMarks: {
|
|
2010
|
+
canonicalName: "Test string",
|
|
2011
|
+
marks: {
|
|
2012
|
+
A: "Test string"
|
|
2013
|
+
},
|
|
2014
|
+
name: "Test string",
|
|
2015
|
+
},
|
|
2016
|
+
severity: "Test string",
|
|
2017
|
+
sourceProperties: {
|
|
2018
|
+
A: 42
|
|
2019
|
+
},
|
|
2020
|
+
state: "Test string",
|
|
2021
|
+
vulnerability: {
|
|
2022
|
+
cve: {
|
|
2023
|
+
cvssv3: {
|
|
2024
|
+
attackComplexity: "Test string",
|
|
2025
|
+
attackVector: "Test string",
|
|
2026
|
+
availabilityImpact: "Test string",
|
|
2027
|
+
baseScore: 42,
|
|
2028
|
+
confidentialityImpact: "Test string",
|
|
2029
|
+
integrityImpact: "Test string",
|
|
2030
|
+
privilegesRequired: "Test string",
|
|
2031
|
+
scope: "Test string",
|
|
2032
|
+
userInteraction: "Test string",
|
|
2033
|
+
},
|
|
2034
|
+
id: "Test string",
|
|
2035
|
+
references: [
|
|
2036
|
+
{
|
|
2037
|
+
source: "Test string",
|
|
2038
|
+
uri: "Test string",
|
|
2039
|
+
}
|
|
2040
|
+
],
|
|
2041
|
+
upstreamFixAvailable: true,
|
|
2042
|
+
},
|
|
2043
|
+
},
|
|
2044
|
+
});
|
|
2045
|
+
/** Updates the mute state of a finding. */
|
|
2046
|
+
await gapi.client.securitycenter.projects.sources.findings.setMute({
|
|
2047
|
+
name: "Test string",
|
|
2048
|
+
}, {
|
|
2049
|
+
mute: "Test string",
|
|
2050
|
+
});
|
|
2051
|
+
/** Updates the state of a finding. */
|
|
2052
|
+
await gapi.client.securitycenter.projects.sources.findings.setState({
|
|
2053
|
+
name: "Test string",
|
|
2054
|
+
}, {
|
|
2055
|
+
startTime: "Test string",
|
|
2056
|
+
state: "Test string",
|
|
2057
|
+
});
|
|
2058
|
+
/** Updates security marks. */
|
|
2059
|
+
await gapi.client.securitycenter.projects.sources.findings.updateSecurityMarks({
|
|
2060
|
+
name: "Test string",
|
|
2061
|
+
startTime: "Test string",
|
|
2062
|
+
updateMask: "Test string",
|
|
2063
|
+
}, {
|
|
2064
|
+
canonicalName: "Test string",
|
|
2065
|
+
marks: {
|
|
2066
|
+
A: "Test string"
|
|
2067
|
+
},
|
|
2068
|
+
name: "Test string",
|
|
2069
|
+
});
|
|
2070
|
+
/** Updates external system. This is for a given finding. */
|
|
2071
|
+
await gapi.client.securitycenter.projects.sources.findings.externalSystems.patch({
|
|
2072
|
+
name: "Test string",
|
|
2073
|
+
updateMask: "Test string",
|
|
2074
|
+
}, {
|
|
2075
|
+
assignees: [
|
|
2076
|
+
"Test string"
|
|
2077
|
+
],
|
|
2078
|
+
externalSystemUpdateTime: "Test string",
|
|
2079
|
+
externalUid: "Test string",
|
|
2080
|
+
name: "Test string",
|
|
2081
|
+
status: "Test string",
|
|
2082
|
+
});
|
|
2083
|
+
}
|
|
2084
|
+
});
|