@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20250228 → 0.0.20250315
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +37 -1
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20250315
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -190,6 +190,10 @@ declare namespace gapi.client {
|
|
|
190
190
|
/** The name of the Backup and DR storage pool that the backup and recovery appliance is storing data in. The storage pool could be of type Cloud, Primary, Snapshot, or OnVault. See the [Backup and DR documentation on storage pools](https://cloud.google.com/backup-disaster-recovery/docs/concepts/storage-pools). For example, `DiskPoolOne`. */
|
|
191
191
|
storagePool?: string;
|
|
192
192
|
}
|
|
193
|
+
interface Chokepoint {
|
|
194
|
+
/** List of resource names of findings associated with this chokepoint. For example, organizations/123/sources/456/findings/789. This list will have at most 100 findings. */
|
|
195
|
+
relatedFindings?: string[];
|
|
196
|
+
}
|
|
193
197
|
interface CloudArmor {
|
|
194
198
|
/** Information about potential Layer 7 DDoS attacks identified by [Google Cloud Armor Adaptive Protection](https://cloud.google.com/armor/docs/adaptive-protection-overview). */
|
|
195
199
|
adaptiveProtection?: AdaptiveProtection;
|
|
@@ -348,6 +352,12 @@ declare namespace gapi.client {
|
|
|
348
352
|
/** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
|
|
349
353
|
userInteraction?: string;
|
|
350
354
|
}
|
|
355
|
+
interface Cwe {
|
|
356
|
+
/** The CWE identifier, e.g. CWE-94 */
|
|
357
|
+
id?: string;
|
|
358
|
+
/** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
|
|
359
|
+
references?: Reference[];
|
|
360
|
+
}
|
|
351
361
|
interface DataAccessEvent {
|
|
352
362
|
/** Unique identifier for data access event. */
|
|
353
363
|
eventId?: string;
|
|
@@ -497,6 +507,8 @@ declare namespace gapi.client {
|
|
|
497
507
|
canonicalName?: string;
|
|
498
508
|
/** The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: "XSS_FLASH_INJECTION" */
|
|
499
509
|
category?: string;
|
|
510
|
+
/** Contains details about a chokepoint, which is a resource or resource group where high-risk attack paths converge, based on [attack path simulations] (https://cloud.google.com/security-command-center/docs/attack-exposure-learn#attack_path_simulations). This field cannot be updated. Its value is ignored in all update requests. */
|
|
511
|
+
chokepoint?: Chokepoint;
|
|
500
512
|
/** Fields related to Cloud Armor findings. */
|
|
501
513
|
cloudArmor?: CloudArmor;
|
|
502
514
|
/** Cloud DLP data profile that is associated with the finding. */
|
|
@@ -1100,6 +1112,10 @@ declare namespace gapi.client {
|
|
|
1100
1112
|
subjects?: GoogleCloudSecuritycenterV2Subject[];
|
|
1101
1113
|
}
|
|
1102
1114
|
interface GoogleCloudSecuritycenterV2BulkMuteFindingsResponse {}
|
|
1115
|
+
interface GoogleCloudSecuritycenterV2Chokepoint {
|
|
1116
|
+
/** List of resource names of findings associated with this chokepoint. For example, organizations/123/sources/456/findings/789. This list will have at most 100 findings. */
|
|
1117
|
+
relatedFindings?: string[];
|
|
1118
|
+
}
|
|
1103
1119
|
interface GoogleCloudSecuritycenterV2CloudArmor {
|
|
1104
1120
|
/** Information about potential Layer 7 DDoS attacks identified by [Google Cloud Armor Adaptive Protection](https://cloud.google.com/armor/docs/adaptive-protection-overview). */
|
|
1105
1121
|
adaptiveProtection?: GoogleCloudSecuritycenterV2AdaptiveProtection;
|
|
@@ -1222,6 +1238,12 @@ declare namespace gapi.client {
|
|
|
1222
1238
|
/** This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. */
|
|
1223
1239
|
userInteraction?: string;
|
|
1224
1240
|
}
|
|
1241
|
+
interface GoogleCloudSecuritycenterV2Cwe {
|
|
1242
|
+
/** The CWE identifier, e.g. CWE-94 */
|
|
1243
|
+
id?: string;
|
|
1244
|
+
/** Any reference to the details on the CWE, for example, https://cwe.mitre.org/data/definitions/94.html */
|
|
1245
|
+
references?: GoogleCloudSecuritycenterV2Reference[];
|
|
1246
|
+
}
|
|
1225
1247
|
interface GoogleCloudSecuritycenterV2DataAccessEvent {
|
|
1226
1248
|
/** Unique identifier for data access event. */
|
|
1227
1249
|
eventId?: string;
|
|
@@ -1367,6 +1389,8 @@ declare namespace gapi.client {
|
|
|
1367
1389
|
canonicalName?: string;
|
|
1368
1390
|
/** Immutable. The additional taxonomy group within findings from a given source. Example: "XSS_FLASH_INJECTION" */
|
|
1369
1391
|
category?: string;
|
|
1392
|
+
/** Contains details about a chokepoint, which is a resource or resource group where high-risk attack paths converge, based on [attack path simulations] (https://cloud.google.com/security-command-center/docs/attack-exposure-learn#attack_path_simulations). This field cannot be updated. Its value is ignored in all update requests. */
|
|
1393
|
+
chokepoint?: GoogleCloudSecuritycenterV2Chokepoint;
|
|
1370
1394
|
/** Fields related to Cloud Armor findings. */
|
|
1371
1395
|
cloudArmor?: GoogleCloudSecuritycenterV2CloudArmor;
|
|
1372
1396
|
/** Cloud DLP data profile that is associated with the finding. */
|
|
@@ -2039,10 +2063,16 @@ declare namespace gapi.client {
|
|
|
2039
2063
|
interface GoogleCloudSecuritycenterV2Vulnerability {
|
|
2040
2064
|
/** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
|
|
2041
2065
|
cve?: GoogleCloudSecuritycenterV2Cve;
|
|
2066
|
+
/** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
|
|
2067
|
+
cwes?: GoogleCloudSecuritycenterV2Cwe[];
|
|
2042
2068
|
/** The fixed package is relevant to the finding. */
|
|
2043
2069
|
fixedPackage?: GoogleCloudSecuritycenterV2Package;
|
|
2044
2070
|
/** The offending package is relevant to the finding. */
|
|
2045
2071
|
offendingPackage?: GoogleCloudSecuritycenterV2Package;
|
|
2072
|
+
/** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
|
|
2073
|
+
providerRiskScore?: string;
|
|
2074
|
+
/** Represents whether the vulnerability is reachable (detected via static analysis) */
|
|
2075
|
+
reachable?: boolean;
|
|
2046
2076
|
/** The security bulletin is relevant to this finding. */
|
|
2047
2077
|
securityBulletin?: GoogleCloudSecuritycenterV2SecurityBulletin;
|
|
2048
2078
|
}
|
|
@@ -2456,10 +2486,16 @@ declare namespace gapi.client {
|
|
|
2456
2486
|
interface Vulnerability {
|
|
2457
2487
|
/** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
|
|
2458
2488
|
cve?: Cve;
|
|
2489
|
+
/** Represents one or more Common Weakness Enumeration (CWE) information on this vulnerability. */
|
|
2490
|
+
cwes?: Cwe[];
|
|
2459
2491
|
/** The fixed package is relevant to the finding. */
|
|
2460
2492
|
fixedPackage?: Package;
|
|
2461
2493
|
/** The offending package is relevant to the finding. */
|
|
2462
2494
|
offendingPackage?: Package;
|
|
2495
|
+
/** Provider provided risk_score based on multiple factors. The higher the risk score, the more risky the vulnerability is. */
|
|
2496
|
+
providerRiskScore?: string;
|
|
2497
|
+
/** Represents whether the vulnerability is reachable (detected via static analysis) */
|
|
2498
|
+
reachable?: boolean;
|
|
2463
2499
|
/** The security bulletin is relevant to this finding. */
|
|
2464
2500
|
securityBulletin?: SecurityBulletin;
|
|
2465
2501
|
}
|