Skip to content

Commit 1ca394c

Browse files
feat(securitycenter): update the api
#### securitycenter:v1 The following keys were added: - schemas.Allowed (Total Keys: 4) - schemas.Denied (Total Keys: 4) - schemas.Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.Finding.properties.job.$ref (Total Keys: 1) - schemas.Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Allowed (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Denied (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.job.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2IpRule (Total Keys: 16) - schemas.GoogleCloudSecuritycenterV2Job (Total Keys: 8) - schemas.GoogleCloudSecuritycenterV2Network (Total Keys: 3) - schemas.GoogleCloudSecuritycenterV2PortRange (Total Keys: 6) - schemas.IpRule (Total Keys: 16) - schemas.Job (Total Keys: 8) - schemas.Network (Total Keys: 3) - schemas.PortRange (Total Keys: 6) #### securitycenter:v1beta1 The following keys were added: - schemas.Allowed (Total Keys: 4) - schemas.Denied (Total Keys: 4) - schemas.Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.Finding.properties.job.$ref (Total Keys: 1) - schemas.Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Allowed (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Denied (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.job.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2IpRule (Total Keys: 16) - schemas.GoogleCloudSecuritycenterV2Job (Total Keys: 8) - schemas.GoogleCloudSecuritycenterV2Network (Total Keys: 3) - schemas.GoogleCloudSecuritycenterV2PortRange (Total Keys: 6) - schemas.IpRule (Total Keys: 16) - schemas.Job (Total Keys: 8) - schemas.Network (Total Keys: 3) - schemas.PortRange (Total Keys: 6) #### securitycenter:v1beta2 The following keys were added: - schemas.Allowed (Total Keys: 4) - schemas.Denied (Total Keys: 4) - schemas.Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.Finding.properties.job.$ref (Total Keys: 1) - schemas.Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2Allowed (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Denied (Total Keys: 4) - schemas.GoogleCloudSecuritycenterV2Finding.properties.ipRules.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.job.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV2Finding.properties.networks (Total Keys: 2) - schemas.GoogleCloudSecuritycenterV2IpRule (Total Keys: 16) - schemas.GoogleCloudSecuritycenterV2Job (Total Keys: 8) - schemas.GoogleCloudSecuritycenterV2Network (Total Keys: 3) - schemas.GoogleCloudSecuritycenterV2PortRange (Total Keys: 6) - schemas.IpRule (Total Keys: 16) - schemas.Job (Total Keys: 8) - schemas.Network (Total Keys: 3) - schemas.PortRange (Total Keys: 6)
1 parent 2129794 commit 1ca394c

9 files changed

+2051
-3
lines changed

docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.customModules.html

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -893,6 +893,50 @@ <h3>Method Details</h3>
893893
&quot;A String&quot;,
894894
],
895895
},
896+
&quot;ipRules&quot;: { # IP rules associated with the finding. # IP rules associated with the finding.
897+
&quot;allowed&quot;: { # Allowed IP rule. # Tuple with allowed rules.
898+
&quot;ipRules&quot;: [ # Optional. Optional list of allowed IP rules.
899+
{ # IP rule information.
900+
&quot;portRanges&quot;: [ # Optional. An optional list of ports to which this rule applies. This field is only applicable for the UDP or (S)TCP protocols. Each entry must be either an integer or a range including a min and max port number.
901+
{ # A port range which is inclusive of the min and max values. Values are between 0 and 2^16-1. The max can be equal / must be not smaller than the min value. If min and max are equal this indicates that it is a single port.
902+
&quot;max&quot;: &quot;A String&quot;, # Maximum port value.
903+
&quot;min&quot;: &quot;A String&quot;, # Minimum port value.
904+
},
905+
],
906+
&quot;protocol&quot;: &quot;A String&quot;, # The IP protocol this rule applies to. This value can either be one of the following well known protocol strings (TCP, UDP, ICMP, ESP, AH, IPIP, SCTP) or a string representation of the integer value.
907+
},
908+
],
909+
},
910+
&quot;denied&quot;: { # Denied IP rule. # Tuple with denied rules.
911+
&quot;ipRules&quot;: [ # Optional. Optional list of denied IP rules.
912+
{ # IP rule information.
913+
&quot;portRanges&quot;: [ # Optional. An optional list of ports to which this rule applies. This field is only applicable for the UDP or (S)TCP protocols. Each entry must be either an integer or a range including a min and max port number.
914+
{ # A port range which is inclusive of the min and max values. Values are between 0 and 2^16-1. The max can be equal / must be not smaller than the min value. If min and max are equal this indicates that it is a single port.
915+
&quot;max&quot;: &quot;A String&quot;, # Maximum port value.
916+
&quot;min&quot;: &quot;A String&quot;, # Minimum port value.
917+
},
918+
],
919+
&quot;protocol&quot;: &quot;A String&quot;, # The IP protocol this rule applies to. This value can either be one of the following well known protocol strings (TCP, UDP, ICMP, ESP, AH, IPIP, SCTP) or a string representation of the integer value.
920+
},
921+
],
922+
},
923+
&quot;destinationIpRanges&quot;: [ # If destination IP ranges are specified, the firewall rule applies only to traffic that has a destination IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4.
924+
&quot;A String&quot;,
925+
],
926+
&quot;direction&quot;: &quot;A String&quot;, # The direction that the rule is applicable to, one of ingress or egress.
927+
&quot;exposedServices&quot;: [ # Name of the network protocol service, such as FTP, that is exposed by the open port. Follows the naming convention available at: https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml.
928+
&quot;A String&quot;,
929+
],
930+
&quot;sourceIpRanges&quot;: [ # If source IP ranges are specified, the firewall rule applies only to traffic that has a source IP address in these ranges. These ranges must be expressed in CIDR format. Only supports IPv4.
931+
&quot;A String&quot;,
932+
],
933+
},
934+
&quot;job&quot;: { # Describes a job # Job associated with the finding.
935+
&quot;errorCode&quot;: 42, # Optional. If the job did not complete successfully, this field describes why.
936+
&quot;location&quot;: &quot;A String&quot;, # Optional. Gives the location where the job ran, such as `US` or `europe-west1`
937+
&quot;name&quot;: &quot;A String&quot;, # The fully-qualified name for a job. e.g. `projects//jobs/`
938+
&quot;state&quot;: &quot;A String&quot;, # Output only. State of the job, such as `RUNNING` or `PENDING`.
939+
},
896940
&quot;kernelRootkit&quot;: { # Kernel mode rootkit signatures. # Signature of the kernel rootkit.
897941
&quot;name&quot;: &quot;A String&quot;, # Rootkit name, when available.
898942
&quot;unexpectedCodeModification&quot;: True or False, # True if unexpected modifications of kernel code memory are present.
@@ -1050,6 +1094,11 @@ <h3>Method Details</h3>
10501094
&quot;muteInitiator&quot;: &quot;A String&quot;, # Records additional information about the mute operation, for example, the [mute configuration](/security-command-center/docs/how-to-mute-findings) that muted the finding and the user who muted the finding.
10511095
&quot;muteUpdateTime&quot;: &quot;A String&quot;, # Output only. The most recent time this finding was muted or unmuted.
10521096
&quot;name&quot;: &quot;A String&quot;, # The [relative resource name](https://cloud.google.com/apis/design/resource_names#relative_resource_name) of the finding. Example: &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;projects/{project_id}/sources/{source_id}/findings/{finding_id}&quot;.
1097+
&quot;networks&quot;: [ # Represents the VPC networks that the resource is attached to.
1098+
{ # Contains information about a VPC network associated with the finding.
1099+
&quot;name&quot;: &quot;A String&quot;, # The name of the VPC network resource, for example, `//compute.googleapis.com/projects/my-project/global/networks/my-network`.
1100+
},
1101+
],
10531102
&quot;nextSteps&quot;: &quot;A String&quot;, # Steps to address the finding.
10541103
&quot;notebook&quot;: { # Represents a Jupyter notebook IPYNB file, such as a [Colab Enterprise notebook](https://cloud.google.com/colab/docs/introduction) file, that is associated with a finding. # Notebook associated with the finding.
10551104
&quot;lastAuthor&quot;: &quot;A String&quot;, # The user ID of the latest author to modify the notebook.

0 commit comments

Comments
 (0)