@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20250131 → 0.0.20250218
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +110 -2
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20250218
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -72,6 +72,10 @@ declare namespace gapi.client {
|
|
|
72
72
|
/** A score of 0 means that there is low confidence that the detected event is an actual attack. A score of 1 means that there is high confidence that the detected event is an attack. See the [Adaptive Protection documentation](https://cloud.google.com/armor/docs/adaptive-protection-overview#configure-alert-tuning) for further explanation. */
|
|
73
73
|
confidence?: number;
|
|
74
74
|
}
|
|
75
|
+
interface Allowed {
|
|
76
|
+
/** Optional. Optional list of allowed IP rules. */
|
|
77
|
+
ipRules?: IpRule[];
|
|
78
|
+
}
|
|
75
79
|
interface Application {
|
|
76
80
|
/** The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`. */
|
|
77
81
|
baseUri?: string;
|
|
@@ -390,6 +394,10 @@ declare namespace gapi.client {
|
|
|
390
394
|
/** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user set the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
|
|
391
395
|
maxRetentionAllowed?: string;
|
|
392
396
|
}
|
|
397
|
+
interface Denied {
|
|
398
|
+
/** Optional. Optional list of denied IP rules. */
|
|
399
|
+
ipRules?: IpRule[];
|
|
400
|
+
}
|
|
393
401
|
interface Details {
|
|
394
402
|
/** The time the subscription has or will end. */
|
|
395
403
|
endTime?: string;
|
|
@@ -537,6 +545,10 @@ declare namespace gapi.client {
|
|
|
537
545
|
iamBindings?: IamBinding[];
|
|
538
546
|
/** Represents what's commonly known as an *indicator of compromise* (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see [Indicator of compromise](https://en.wikipedia.org/wiki/Indicator_of_compromise). */
|
|
539
547
|
indicator?: Indicator;
|
|
548
|
+
/** IP rules associated with the finding. */
|
|
549
|
+
ipRules?: IpRules;
|
|
550
|
+
/** Job associated with the finding. */
|
|
551
|
+
job?: Job;
|
|
540
552
|
/** Signature of the kernel rootkit. */
|
|
541
553
|
kernelRootkit?: KernelRootkit;
|
|
542
554
|
/** Kubernetes resources associated with the finding. */
|
|
@@ -559,6 +571,8 @@ declare namespace gapi.client {
|
|
|
559
571
|
muteUpdateTime?: string;
|
|
560
572
|
/** The [relative resource name](https://cloud.google.com/apis/design/resource_names#relative_resource_name) of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}". */
|
|
561
573
|
name?: string;
|
|
574
|
+
/** Represents the VPC networks that the resource is attached to. */
|
|
575
|
+
networks?: Network[];
|
|
562
576
|
/** Steps to address the finding. */
|
|
563
577
|
nextSteps?: string;
|
|
564
578
|
/** Notebook associated with the finding. */
|
|
@@ -939,6 +953,10 @@ declare namespace gapi.client {
|
|
|
939
953
|
/** A score of 0 means that there is low confidence that the detected event is an actual attack. A score of 1 means that there is high confidence that the detected event is an attack. See the [Adaptive Protection documentation](https://cloud.google.com/armor/docs/adaptive-protection-overview#configure-alert-tuning) for further explanation. */
|
|
940
954
|
confidence?: number;
|
|
941
955
|
}
|
|
956
|
+
interface GoogleCloudSecuritycenterV2Allowed {
|
|
957
|
+
/** Optional. Optional list of allowed IP rules. */
|
|
958
|
+
ipRules?: GoogleCloudSecuritycenterV2IpRule[];
|
|
959
|
+
}
|
|
942
960
|
interface GoogleCloudSecuritycenterV2Application {
|
|
943
961
|
/** The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`. */
|
|
944
962
|
baseUri?: string;
|
|
@@ -1250,6 +1268,10 @@ declare namespace gapi.client {
|
|
|
1250
1268
|
/** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user set the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
|
|
1251
1269
|
maxRetentionAllowed?: string;
|
|
1252
1270
|
}
|
|
1271
|
+
interface GoogleCloudSecuritycenterV2Denied {
|
|
1272
|
+
/** Optional. Optional list of denied IP rules. */
|
|
1273
|
+
ipRules?: GoogleCloudSecuritycenterV2IpRule[];
|
|
1274
|
+
}
|
|
1253
1275
|
interface GoogleCloudSecuritycenterV2Detection {
|
|
1254
1276
|
/** The name of the binary associated with the memory hash signature detection. */
|
|
1255
1277
|
binary?: string;
|
|
@@ -1393,6 +1415,10 @@ declare namespace gapi.client {
|
|
|
1393
1415
|
iamBindings?: GoogleCloudSecuritycenterV2IamBinding[];
|
|
1394
1416
|
/** Represents what's commonly known as an *indicator of compromise* (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see [Indicator of compromise](https://en.wikipedia.org/wiki/Indicator_of_compromise). */
|
|
1395
1417
|
indicator?: GoogleCloudSecuritycenterV2Indicator;
|
|
1418
|
+
/** IP rules associated with the finding. */
|
|
1419
|
+
ipRules?: GoogleCloudSecuritycenterV2IpRules;
|
|
1420
|
+
/** Job associated with the finding. */
|
|
1421
|
+
job?: GoogleCloudSecuritycenterV2Job;
|
|
1396
1422
|
/** Signature of the kernel rootkit. */
|
|
1397
1423
|
kernelRootkit?: GoogleCloudSecuritycenterV2KernelRootkit;
|
|
1398
1424
|
/** Kubernetes resources associated with the finding. */
|
|
@@ -1415,6 +1441,8 @@ declare namespace gapi.client {
|
|
|
1415
1441
|
muteUpdateTime?: string;
|
|
1416
1442
|
/** The [relative resource name](https://cloud.google.com/apis/design/resource_names#relative_resource_name) of the finding. The following list shows some examples: + `organizations/{organization_id}/sources/{source_id}/findings/{finding_id}` + `organizations/{organization_id}/sources/{source_id}/locations/{location_id}/findings/{finding_id}` + `folders/{folder_id}/sources/{source_id}/findings/{finding_id}` + `folders/{folder_id}/sources/{source_id}/locations/{location_id}/findings/{finding_id}` + `projects/{project_id}/sources/{source_id}/findings/{finding_id}` + `projects/{project_id}/sources/{source_id}/locations/{location_id}/findings/{finding_id}` */
|
|
1417
1443
|
name?: string;
|
|
1444
|
+
/** Represents the VPC networks that the resource is attached to. */
|
|
1445
|
+
networks?: GoogleCloudSecuritycenterV2Network[];
|
|
1418
1446
|
/** Steps to address the finding. */
|
|
1419
1447
|
nextSteps?: string;
|
|
1420
1448
|
/** Notebook associated with the finding. */
|
|
@@ -1478,6 +1506,26 @@ declare namespace gapi.client {
|
|
|
1478
1506
|
/** The list of URIs associated to the Findings. */
|
|
1479
1507
|
uris?: string[];
|
|
1480
1508
|
}
|
|
1509
|
+
interface GoogleCloudSecuritycenterV2IpRule {
|
|
1510
|
+
/** Optional. An optional list of ports to which this rule applies. This field is only applicable for the UDP or (S)TCP protocols. Each entry must be either an integer or a range including a min and max port number. */
|
|
1511
|
+
portRanges?: GoogleCloudSecuritycenterV2PortRange[];
|
|
1512
|
+
/** The IP protocol this rule applies to. This value can either be one of the following well known protocol strings (TCP, UDP, ICMP, ESP, AH, IPIP, SCTP) or a string representation of the integer value. */
|
|
1513
|
+
protocol?: string;
|
|
1514
|
+
}
|
|
1515
|
+
interface GoogleCloudSecuritycenterV2IpRules {
|
|
1516
|
+
/** Tuple with allowed rules. */
|
|
1517
|
+
allowed?: GoogleCloudSecuritycenterV2Allowed;
|
|
1518
|
+
/** Tuple with denied rules. */
|
|
1519
|
+
denied?: GoogleCloudSecuritycenterV2Denied;
|
|
1520
|
+
/** If destination IP ranges are specified, the firewall rule applies only to traffic that has a destination IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4. */
|
|
1521
|
+
destinationIpRanges?: string[];
|
|
1522
|
+
/** The direction that the rule is applicable to, one of ingress or egress. */
|
|
1523
|
+
direction?: string;
|
|
1524
|
+
/** Name of the network protocol service, such as FTP, that is exposed by the open port. Follows the naming convention available at: https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml. */
|
|
1525
|
+
exposedServices?: string[];
|
|
1526
|
+
/** If source IP ranges are specified, the firewall rule applies only to traffic that has a source IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4. */
|
|
1527
|
+
sourceIpRanges?: string[];
|
|
1528
|
+
}
|
|
1481
1529
|
interface GoogleCloudSecuritycenterV2Issue {
|
|
1482
1530
|
/** Output only. The time the issue was created. */
|
|
1483
1531
|
createTime?: string;
|
|
@@ -1602,6 +1650,16 @@ declare namespace gapi.client {
|
|
|
1602
1650
|
/** Context values. */
|
|
1603
1651
|
values?: string[];
|
|
1604
1652
|
}
|
|
1653
|
+
interface GoogleCloudSecuritycenterV2Job {
|
|
1654
|
+
/** Optional. If the job did not complete successfully, this field describes why. */
|
|
1655
|
+
errorCode?: number;
|
|
1656
|
+
/** Optional. Gives the location where the job ran, such as `US` or `europe-west1` */
|
|
1657
|
+
location?: string;
|
|
1658
|
+
/** The fully-qualified name for a job. e.g. `projects//jobs/` */
|
|
1659
|
+
name?: string;
|
|
1660
|
+
/** Output only. State of the job, such as `RUNNING` or `PENDING`. */
|
|
1661
|
+
state?: string;
|
|
1662
|
+
}
|
|
1605
1663
|
interface GoogleCloudSecuritycenterV2KernelRootkit {
|
|
1606
1664
|
/** Rootkit name, when available. */
|
|
1607
1665
|
name?: string;
|
|
@@ -1694,6 +1752,10 @@ declare namespace gapi.client {
|
|
|
1694
1752
|
/** If set, the static mute applied to this finding. Static mutes override dynamic mutes. If unset, there is no static mute. */
|
|
1695
1753
|
staticMute?: GoogleCloudSecuritycenterV2StaticMute;
|
|
1696
1754
|
}
|
|
1755
|
+
interface GoogleCloudSecuritycenterV2Network {
|
|
1756
|
+
/** The name of the VPC network resource, for example, `//compute.googleapis.com/projects/my-project/global/networks/my-network`. */
|
|
1757
|
+
name?: string;
|
|
1758
|
+
}
|
|
1697
1759
|
interface GoogleCloudSecuritycenterV2Node {
|
|
1698
1760
|
/** [Full resource name](https://google.aip.dev/122#full-resource-names) of the Compute Engine VM running the cluster node. */
|
|
1699
1761
|
name?: string;
|
|
@@ -1735,7 +1797,7 @@ declare namespace gapi.client {
|
|
|
1735
1797
|
ns?: string;
|
|
1736
1798
|
}
|
|
1737
1799
|
interface GoogleCloudSecuritycenterV2OrgPolicy {
|
|
1738
|
-
/** The resource name of the org policy. Example: "organizations/{organization_id}/policies/{constraint_name}" */
|
|
1800
|
+
/** Identifier. The resource name of the org policy. Example: "organizations/{organization_id}/policies/{constraint_name}" */
|
|
1739
1801
|
name?: string;
|
|
1740
1802
|
}
|
|
1741
1803
|
interface GoogleCloudSecuritycenterV2Package {
|
|
@@ -1766,6 +1828,12 @@ declare namespace gapi.client {
|
|
|
1766
1828
|
/** The name of the updated field, for example constraint.implementation.policy_rules[0].enforce */
|
|
1767
1829
|
field?: string;
|
|
1768
1830
|
}
|
|
1831
|
+
interface GoogleCloudSecuritycenterV2PortRange {
|
|
1832
|
+
/** Maximum port value. */
|
|
1833
|
+
max?: string;
|
|
1834
|
+
/** Minimum port value. */
|
|
1835
|
+
min?: string;
|
|
1836
|
+
}
|
|
1769
1837
|
interface GoogleCloudSecuritycenterV2Process {
|
|
1770
1838
|
/** Process arguments as JSON encoded strings. */
|
|
1771
1839
|
args?: string[];
|
|
@@ -2006,6 +2074,36 @@ declare namespace gapi.client {
|
|
|
2006
2074
|
/** The list of URIs associated to the Findings. */
|
|
2007
2075
|
uris?: string[];
|
|
2008
2076
|
}
|
|
2077
|
+
interface IpRule {
|
|
2078
|
+
/** Optional. An optional list of ports to which this rule applies. This field is only applicable for the UDP or (S)TCP protocols. Each entry must be either an integer or a range including a min and max port number. */
|
|
2079
|
+
portRanges?: PortRange[];
|
|
2080
|
+
/** The IP protocol this rule applies to. This value can either be one of the following well known protocol strings (TCP, UDP, ICMP, ESP, AH, IPIP, SCTP) or a string representation of the integer value. */
|
|
2081
|
+
protocol?: string;
|
|
2082
|
+
}
|
|
2083
|
+
interface IpRules {
|
|
2084
|
+
/** Tuple with allowed rules. */
|
|
2085
|
+
allowed?: Allowed;
|
|
2086
|
+
/** Tuple with denied rules. */
|
|
2087
|
+
denied?: Denied;
|
|
2088
|
+
/** If destination IP ranges are specified, the firewall rule applies only to traffic that has a destination IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4. */
|
|
2089
|
+
destinationIpRanges?: string[];
|
|
2090
|
+
/** The direction that the rule is applicable to, one of ingress or egress. */
|
|
2091
|
+
direction?: string;
|
|
2092
|
+
/** Name of the network protocol service, such as FTP, that is exposed by the open port. Follows the naming convention available at: https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml. */
|
|
2093
|
+
exposedServices?: string[];
|
|
2094
|
+
/** If source IP ranges are specified, the firewall rule applies only to traffic that has a source IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4. */
|
|
2095
|
+
sourceIpRanges?: string[];
|
|
2096
|
+
}
|
|
2097
|
+
interface Job {
|
|
2098
|
+
/** Optional. If the job did not complete successfully, this field describes why. */
|
|
2099
|
+
errorCode?: number;
|
|
2100
|
+
/** Optional. Gives the location where the job ran, such as `US` or `europe-west1` */
|
|
2101
|
+
location?: string;
|
|
2102
|
+
/** The fully-qualified name for a job. e.g. `projects//jobs/` */
|
|
2103
|
+
name?: string;
|
|
2104
|
+
/** Output only. State of the job, such as `RUNNING` or `PENDING`. */
|
|
2105
|
+
state?: string;
|
|
2106
|
+
}
|
|
2009
2107
|
interface KernelRootkit {
|
|
2010
2108
|
/** Rootkit name, when available. */
|
|
2011
2109
|
name?: string;
|
|
@@ -2081,6 +2179,10 @@ declare namespace gapi.client {
|
|
|
2081
2179
|
/** If set, the static mute applied to this finding. Static mutes override dynamic mutes. If unset, there is no static mute. */
|
|
2082
2180
|
staticMute?: StaticMute;
|
|
2083
2181
|
}
|
|
2182
|
+
interface Network {
|
|
2183
|
+
/** The name of the VPC network resource, for example, `//compute.googleapis.com/projects/my-project/global/networks/my-network`. */
|
|
2184
|
+
name?: string;
|
|
2185
|
+
}
|
|
2084
2186
|
interface Node {
|
|
2085
2187
|
/** [Full resource name](https://google.aip.dev/122#full-resource-names) of the Compute Engine VM running the cluster node. */
|
|
2086
2188
|
name?: string;
|
|
@@ -2145,6 +2247,12 @@ declare namespace gapi.client {
|
|
|
2145
2247
|
/** The name of the updated field, for example constraint.implementation.policy_rules[0].enforce */
|
|
2146
2248
|
field?: string;
|
|
2147
2249
|
}
|
|
2250
|
+
interface PortRange {
|
|
2251
|
+
/** Maximum port value. */
|
|
2252
|
+
max?: string;
|
|
2253
|
+
/** Minimum port value. */
|
|
2254
|
+
min?: string;
|
|
2255
|
+
}
|
|
2148
2256
|
interface Process {
|
|
2149
2257
|
/** Process arguments as JSON encoded strings. */
|
|
2150
2258
|
args?: string[];
|