@maxim_mazurok/gapi.client.securitycenter-v1beta2 0.0.20250605 → 0.0.20250609

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +81 -1
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://securitycenter.googleapis.com/$discovery/rest?version=v1beta2
12
- // Revision: 20250605
12
+ // Revision: 20250609
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -76,6 +76,22 @@ declare namespace gapi.client {
76
76
  /** The count of resources affected by the finding. */
77
77
  count?: string;
78
78
  }
79
+ interface AiModel {
80
+ /** The platform on which the model is deployed. */
81
+ deploymentPlatform?: string;
82
+ /** The user defined display name of model. Ex. baseline-classification-model */
83
+ displayName?: string;
84
+ /** The domain of the model, for example, “image-classification”. */
85
+ domain?: string;
86
+ /** The name of the model library, for example, “transformers”. */
87
+ library?: string;
88
+ /** The region in which the model is used, for example, “us-central1”. */
89
+ location?: string;
90
+ /** The name of the AI model, for example, "gemini:1.0.0". */
91
+ name?: string;
92
+ /** The publisher of the model, for example, “google” or “nvidia”. */
93
+ publisher?: string;
94
+ }
79
95
  interface Allowed {
80
96
  /** Optional. Optional list of allowed IP rules. */
81
97
  ipRules?: IpRule[];
@@ -390,6 +406,14 @@ declare namespace gapi.client {
390
406
  /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user sets the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
391
407
  maxRetentionAllowed?: string;
392
408
  }
409
+ interface Dataset {
410
+ /** The user defined display name of dataset, e.g. plants-dataset */
411
+ displayName?: string;
412
+ /** Resource name of dataset, e.g. projects/{project}/locations/{location}/datasets/2094040236064505856 */
413
+ name?: string;
414
+ /** Data source, such as BigQuery source URI, e.g. bq://scc-nexus-test.AIPPtest.gsod */
415
+ source?: string;
416
+ }
393
417
  interface Denied {
394
418
  /** Optional. Optional list of denied IP rules. */
395
419
  ipRules?: IpRule[];
@@ -491,6 +515,8 @@ declare namespace gapi.client {
491
515
  access?: Access;
492
516
  /** AffectedResources associated with the finding. */
493
517
  affectedResources?: AffectedResources;
518
+ /** The AI model associated with the finding. */
519
+ aiModel?: AiModel;
494
520
  /** Represents an application associated with the finding. */
495
521
  application?: Application;
496
522
  /** The results of an attack path simulation relevant to this finding. */
@@ -605,6 +631,8 @@ declare namespace gapi.client {
605
631
  state?: string;
606
632
  /** Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination. This field cannot be updated. Its value is ignored in all update requests. */
607
633
  toxicCombination?: ToxicCombination;
634
+ /** VertexAi associated with the finding. */
635
+ vertexAi?: VertexAi;
608
636
  /** Represents vulnerability-specific fields like CVE and CVSS scores. CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
609
637
  vulnerability?: Vulnerability;
610
638
  }
@@ -963,6 +991,22 @@ declare namespace gapi.client {
963
991
  /** The count of resources affected by the finding. */
964
992
  count?: string;
965
993
  }
994
+ interface GoogleCloudSecuritycenterV2AiModel {
995
+ /** The platform on which the model is deployed. */
996
+ deploymentPlatform?: string;
997
+ /** The user defined display name of model. Ex. baseline-classification-model */
998
+ displayName?: string;
999
+ /** The domain of the model, for example, “image-classification”. */
1000
+ domain?: string;
1001
+ /** The name of the model library, for example, “transformers”. */
1002
+ library?: string;
1003
+ /** The region in which the model is used, for example, “us-central1”. */
1004
+ location?: string;
1005
+ /** The name of the AI model, for example, "gemini:1.0.0". */
1006
+ name?: string;
1007
+ /** The publisher of the model, for example, “google” or “nvidia”. */
1008
+ publisher?: string;
1009
+ }
966
1010
  interface GoogleCloudSecuritycenterV2Allowed {
967
1011
  /** Optional. Optional list of allowed IP rules. */
968
1012
  ipRules?: GoogleCloudSecuritycenterV2IpRule[];
@@ -1288,6 +1332,14 @@ declare namespace gapi.client {
1288
1332
  /** Maximum duration of retention allowed from the DRD control. This comes from the DRD control where users set a max TTL for their data. For example, suppose that a user sets the max TTL for a Cloud Storage bucket to 90 days. However, an object in that bucket is 100 days old. In this case, a DataRetentionDeletionEvent will be generated for that Cloud Storage bucket, and the max_retention_allowed is 90 days. */
1289
1333
  maxRetentionAllowed?: string;
1290
1334
  }
1335
+ interface GoogleCloudSecuritycenterV2Dataset {
1336
+ /** The user defined display name of dataset, e.g. plants-dataset */
1337
+ displayName?: string;
1338
+ /** Resource name of dataset, e.g. projects/{project}/locations/{location}/datasets/2094040236064505856 */
1339
+ name?: string;
1340
+ /** Data source, such as BigQuery source URI, e.g. bq://scc-nexus-test.AIPPtest.gsod */
1341
+ source?: string;
1342
+ }
1291
1343
  interface GoogleCloudSecuritycenterV2Denied {
1292
1344
  /** Optional. Optional list of denied IP rules. */
1293
1345
  ipRules?: GoogleCloudSecuritycenterV2IpRule[];
@@ -1385,6 +1437,8 @@ declare namespace gapi.client {
1385
1437
  access?: GoogleCloudSecuritycenterV2Access;
1386
1438
  /** AffectedResources associated with the finding. */
1387
1439
  affectedResources?: GoogleCloudSecuritycenterV2AffectedResources;
1440
+ /** The AI model associated with the finding. */
1441
+ aiModel?: GoogleCloudSecuritycenterV2AiModel;
1388
1442
  /** Represents an application associated with the finding. */
1389
1443
  application?: GoogleCloudSecuritycenterV2Application;
1390
1444
  /** The results of an attack path simulation relevant to this finding. */
@@ -1499,6 +1553,8 @@ declare namespace gapi.client {
1499
1553
  state?: string;
1500
1554
  /** Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination. This field cannot be updated. Its value is ignored in all update requests. */
1501
1555
  toxicCombination?: GoogleCloudSecuritycenterV2ToxicCombination;
1556
+ /** VertexAi associated with the finding. */
1557
+ vertexAi?: GoogleCloudSecuritycenterV2VertexAi;
1502
1558
  /** Represents vulnerability-specific fields like CVE and CVSS scores. CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
1503
1559
  vulnerability?: GoogleCloudSecuritycenterV2Vulnerability;
1504
1560
  }
@@ -1840,6 +1896,12 @@ declare namespace gapi.client {
1840
1896
  /** The version of the package. */
1841
1897
  packageVersion?: string;
1842
1898
  }
1899
+ interface GoogleCloudSecuritycenterV2Pipeline {
1900
+ /** The user defined display name of pipeline, e.g. plants-classification */
1901
+ displayName?: string;
1902
+ /** Resource name of pipeline, e.g. projects/{project}/locations/{location}/trainingPipelines/5253428229225578496 */
1903
+ name?: string;
1904
+ }
1843
1905
  interface GoogleCloudSecuritycenterV2Pod {
1844
1906
  /** Pod containers associated with this finding, if any. */
1845
1907
  containers?: GoogleCloudSecuritycenterV2Container[];
@@ -2066,6 +2128,12 @@ declare namespace gapi.client {
2066
2128
  /** List of resource names of findings associated with this toxic combination. For example, `organizations/123/sources/456/findings/789`. */
2067
2129
  relatedFindings?: string[];
2068
2130
  }
2131
+ interface GoogleCloudSecuritycenterV2VertexAi {
2132
+ /** Datasets associated with the finding. */
2133
+ datasets?: GoogleCloudSecuritycenterV2Dataset[];
2134
+ /** Pipelines associated with the finding. */
2135
+ pipelines?: GoogleCloudSecuritycenterV2Pipeline[];
2136
+ }
2069
2137
  interface GoogleCloudSecuritycenterV2Vulnerability {
2070
2138
  /** CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) */
2071
2139
  cve?: GoogleCloudSecuritycenterV2Cve;
@@ -2265,6 +2333,12 @@ declare namespace gapi.client {
2265
2333
  /** The version of the package. */
2266
2334
  packageVersion?: string;
2267
2335
  }
2336
+ interface Pipeline {
2337
+ /** The user defined display name of pipeline, e.g. plants-classification */
2338
+ displayName?: string;
2339
+ /** Resource name of pipeline, e.g. projects/{project}/locations/{location}/trainingPipelines/5253428229225578496 */
2340
+ name?: string;
2341
+ }
2268
2342
  interface Pod {
2269
2343
  /** Pod containers associated with this finding, if any. */
2270
2344
  containers?: Container[];
@@ -2477,6 +2551,12 @@ declare namespace gapi.client {
2477
2551
  /** List of resource names of findings associated with this toxic combination. For example, `organizations/123/sources/456/findings/789`. */
2478
2552
  relatedFindings?: string[];
2479
2553
  }
2554
+ interface VertexAi {
2555
+ /** Datasets associated with the finding. */
2556
+ datasets?: Dataset[];
2557
+ /** Pipelines associated with the finding. */
2558
+ pipelines?: Pipeline[];
2559
+ }
2480
2560
  interface VirtualMachineThreatDetectionSettings {
2481
2561
  /** The configurations including the state of enablement for the service's different modules. The absence of a module in the map implies its configuration is inherited from its parent's configuration. */
2482
2562
  modules?: {[P in string]: Config};
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.securitycenter-v1beta2",
3
- "version": "0.0.20250605",
3
+ "version": "0.0.20250609",
4
4
  "description": "TypeScript typings for Security Command Center API v1beta2",
5
5
  "repository": {
6
6
  "type": "git",