@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20250221 → 0.0.20250308

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +29 -5
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
12
- // Revision: 20250221
12
+ // Revision: 20250308
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -348,6 +348,12 @@ declare namespace gapi.client {
348
348
  /** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
349
349
  userInteraction?: string;
350
350
  }
351
+ interface Cwe {
352
+ /** The CWE identifier, e.g. CWE-94 */
353
+ id?: string;
354
+ /** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
355
+ references?: Reference[];
356
+ }
351
357
  interface DataAccessEvent {
352
358
  /** Unique identifier for data access event. */
353
359
  eventId?: string;
@@ -391,7 +397,7 @@ declare namespace gapi.client {
391
397
  eventDetectionTime?: string;
392
398
  /** Type of the DRD event. */
393
399
  eventType?: string;
394
- /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user set the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
400
+ /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user sets the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
395
401
  maxRetentionAllowed?: string;
396
402
  }
397
403
  interface Denied {
@@ -413,7 +419,7 @@ declare namespace gapi.client {
413
419
  percentPagesMatched?: number;
414
420
  }
415
421
  interface Disk {
416
- /** The name of the disk, for example, "https://www.googleapis.com/compute/v1/projects/project-id/zones/zone-id/disks/disk-id". */
422
+ /** The name of the disk, for example, "https://www.googleapis.com/compute/v1/projects/{project-id}/zones/{zone-id}/disks/{disk-id}". */
417
423
  name?: string;
418
424
  }
419
425
  interface DiskPath {
@@ -1222,6 +1228,12 @@ declare namespace gapi.client {
1222
1228
  /** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
1223
1229
  userInteraction?: string;
1224
1230
  }
1231
+ interface GoogleCloudSecuritycenterV2Cwe {
1232
+ /** The CWE identifier, e.g. CWE-94 */
1233
+ id?: string;
1234
+ /** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
1235
+ references?: GoogleCloudSecuritycenterV2Reference[];
1236
+ }
1225
1237
  interface GoogleCloudSecuritycenterV2DataAccessEvent {
1226
1238
  /** Unique identifier for data access event. */
1227
1239
  eventId?: string;
@@ -1265,7 +1277,7 @@ declare namespace gapi.client {
1265
1277
  eventDetectionTime?: string;
1266
1278
  /** Type of the DRD event. */
1267
1279
  eventType?: string;
1268
- /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user set the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
1280
+ /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user sets the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
1269
1281
  maxRetentionAllowed?: string;
1270
1282
  }
1271
1283
  interface GoogleCloudSecuritycenterV2Denied {
@@ -1279,7 +1291,7 @@ declare namespace gapi.client {
1279
1291
  percentPagesMatched?: number;
1280
1292
  }
1281
1293
  interface GoogleCloudSecuritycenterV2Disk {
1282
- /** The name of the disk, for example, "https://www.googleapis.com/compute/v1/projects/project-id/zones/zone-id/disks/disk-id". */
1294
+ /** The name of the disk, for example, "https://www.googleapis.com/compute/v1/projects/{project-id}/zones/{zone-id}/disks/{disk-id}". */
1283
1295
  name?: string;
1284
1296
  }
1285
1297
  interface GoogleCloudSecuritycenterV2DiskPath {
@@ -2039,10 +2051,16 @@ declare namespace gapi.client {
2039
2051
  interface GoogleCloudSecuritycenterV2Vulnerability {
2040
2052
  /** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
2041
2053
  cve?: GoogleCloudSecuritycenterV2Cve;
2054
+ /** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
2055
+ cwes?: GoogleCloudSecuritycenterV2Cwe[];
2042
2056
  /** The fixed package is relevant to the finding. */
2043
2057
  fixedPackage?: GoogleCloudSecuritycenterV2Package;
2044
2058
  /** The offending package is relevant to the finding. */
2045
2059
  offendingPackage?: GoogleCloudSecuritycenterV2Package;
2060
+ /** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
2061
+ providerRiskScore?: string;
2062
+ /** Represents whether the vulnerability is reachable (detected via static analysis) */
2063
+ reachable?: boolean;
2046
2064
  /** The security bulletin is relevant to this finding. */
2047
2065
  securityBulletin?: GoogleCloudSecuritycenterV2SecurityBulletin;
2048
2066
  }
@@ -2456,10 +2474,16 @@ declare namespace gapi.client {
2456
2474
  interface Vulnerability {
2457
2475
  /** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
2458
2476
  cve?: Cve;
2477
+ /** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
2478
+ cwes?: Cwe[];
2459
2479
  /** The fixed package is relevant to the finding. */
2460
2480
  fixedPackage?: Package;
2461
2481
  /** The offending package is relevant to the finding. */
2462
2482
  offendingPackage?: Package;
2483
+ /** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
2484
+ providerRiskScore?: string;
2485
+ /** Represents whether the vulnerability is reachable (detected via static analysis) */
2486
+ reachable?: boolean;
2463
2487
  /** The security bulletin is relevant to this finding. */
2464
2488
  securityBulletin?: SecurityBulletin;
2465
2489
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.securitycenter-v1beta2",
3
- "version": "0.0.20250221",
3
+ "version": "0.0.20250308",
4
4
  "description": "TypeScript typings for Security Command Center API v1beta2",
5
5
  "repository": {
6
6
  "type": "git",