Skip to content

Commit eafd970

Browse files
feat: Automated regeneration of securitycenter v1beta2 client (#13059)
Auto-created at 2022-12-13 11:12:04 +0000 using the toys pull request generator.
1 parent 951eee9 commit eafd970

File tree

3 files changed

+37
-31
lines changed

3 files changed

+37
-31
lines changed

generated/google-apis-securitycenter_v1beta2/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
# Release history for google-apis-securitycenter_v1beta2
22

3+
### v0.42.0 (2022-12-13)
4+
5+
* Regenerated from discovery document revision 20221208
6+
37
### v0.41.0 (2022-12-02)
48

59
* Regenerated from discovery document revision 20221121

generated/google-apis-securitycenter_v1beta2/lib/google/apis/securitycenter_v1beta2/classes.rb

Lines changed: 31 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -311,11 +311,11 @@ def update!(**args)
311311
end
312312
end
313313

314-
# Representa a single contact's email address
314+
# The email address of a contact.
315315
class Contact
316316
include Google::Apis::Core::Hashable
317317

318-
# An email address e.g. "[email protected]"
318+
# An email address. For example, "`[email protected]`".
319319
# Corresponds to the JSON property `email`
320320
# @return [String]
321321
attr_accessor :email
@@ -990,10 +990,11 @@ class Finding
990990
# @return [Array<Google::Apis::SecuritycenterV1beta2::IamBinding>]
991991
attr_accessor :iam_bindings
992992

993-
# Represents what's commonly known as an Indicator of compromise (IoC) in
993+
# Represents what's commonly known as an _indicator of compromise_ (IoC) in
994994
# computer forensics. This is an artifact observed on a network or in an
995995
# operating system that, with high confidence, indicates a computer intrusion.
996-
# Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
996+
# For more information, see [Indicator of compromise](https://en.wikipedia.org/
997+
# wiki/Indicator_of_compromise).
997998
# Corresponds to the JSON property `indicator`
998999
# @return [Google::Apis::SecuritycenterV1beta2::Indicator]
9991000
attr_accessor :indicator
@@ -1003,7 +1004,7 @@ class Finding
10031004
# @return [Google::Apis::SecuritycenterV1beta2::KernelRootkit]
10041005
attr_accessor :kernel_rootkit
10051006

1006-
# Kubernetes related attributes.
1007+
# Kubernetes-related attributes.
10071008
# Corresponds to the JSON property `kubernetes`
10081009
# @return [Google::Apis::SecuritycenterV1beta2::Kubernetes]
10091010
attr_accessor :kubernetes
@@ -1297,8 +1298,8 @@ class GoogleCloudSecuritycenterV1Binding
12971298
# @return [Google::Apis::SecuritycenterV1beta2::Role]
12981299
attr_accessor :role
12991300

1300-
# Represents the subjects(s) bound to the role. Not always available for PATCH
1301-
# requests.
1301+
# Represents one or more subjects that are bound to the role. Not always
1302+
# available for PATCH requests.
13021303
# Corresponds to the JSON property `subjects`
13031304
# @return [Array<Google::Apis::SecuritycenterV1beta2::Subject>]
13041305
attr_accessor :subjects
@@ -1439,10 +1440,10 @@ class GoogleCloudSecuritycenterV1ExternalSystem
14391440
# @return [String]
14401441
attr_accessor :external_uid
14411442

1442-
# External System Name e.g. jira, demisto, etc. e.g.: `organizations/1234/
1443-
# sources/5678/findings/123456/externalSystems/jira` `folders/1234/sources/5678/
1444-
# findings/123456/externalSystems/jira` `projects/1234/sources/5678/findings/
1445-
# 123456/externalSystems/jira`
1443+
# Full resource name of the external system, for example: "organizations/1234/
1444+
# sources/5678/findings/123456/externalSystems/jira", "folders/1234/sources/5678/
1445+
# findings/123456/externalSystems/jira", "projects/1234/sources/5678/findings/
1446+
# 123456/externalSystems/jira"
14461447
# Corresponds to the JSON property `name`
14471448
# @return [String]
14481449
attr_accessor :name
@@ -2073,10 +2074,11 @@ def update!(**args)
20732074
end
20742075
end
20752076

2076-
# Represents what's commonly known as an Indicator of compromise (IoC) in
2077+
# Represents what's commonly known as an _indicator of compromise_ (IoC) in
20772078
# computer forensics. This is an artifact observed on a network or in an
20782079
# operating system that, with high confidence, indicates a computer intrusion.
2079-
# Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
2080+
# For more information, see [Indicator of compromise](https://en.wikipedia.org/
2081+
# wiki/Indicator_of_compromise).
20802082
class Indicator
20812083
include Google::Apis::Core::Hashable
20822084

@@ -2085,7 +2087,7 @@ class Indicator
20852087
# @return [Array<String>]
20862088
attr_accessor :domains
20872089

2088-
# List of ip addresses associated to the Finding.
2090+
# The list of IP addresses that are associated with the finding.
20892091
# Corresponds to the JSON property `ipAddresses`
20902092
# @return [Array<String>]
20912093
attr_accessor :ip_addresses
@@ -2123,55 +2125,55 @@ class KernelRootkit
21232125
# @return [String]
21242126
attr_accessor :name
21252127

2126-
# Flag indicating unexpected modifications of kernel code memory.
2128+
# True when unexpected modifications of kernel code memory are present.
21272129
# Corresponds to the JSON property `unexpectedCodeModification`
21282130
# @return [Boolean]
21292131
attr_accessor :unexpected_code_modification
21302132
alias_method :unexpected_code_modification?, :unexpected_code_modification
21312133

2132-
# Flag indicating presence of ftrace points with callbacks pointing to regions
2133-
# that are not in the expected kernel or module code range.
2134+
# True when `ftrace` points are present with callbacks pointing to regions that
2135+
# are not in the expected kernel or module code range.
21342136
# Corresponds to the JSON property `unexpectedFtraceHandler`
21352137
# @return [Boolean]
21362138
attr_accessor :unexpected_ftrace_handler
21372139
alias_method :unexpected_ftrace_handler?, :unexpected_ftrace_handler
21382140

2139-
# Flag indicating presence of interrupt handlers that are are not in the
2140-
# expected kernel, module code regions.
2141+
# True when interrupt handlers that are are not in the expected kernel or module
2142+
# code regions are present.
21412143
# Corresponds to the JSON property `unexpectedInterruptHandler`
21422144
# @return [Boolean]
21432145
attr_accessor :unexpected_interrupt_handler
21442146
alias_method :unexpected_interrupt_handler?, :unexpected_interrupt_handler
21452147

2146-
# Flag indicating presence of kernel code pages that are not in the expected
2147-
# kernel, module code regions.
2148+
# True when kernel code pages that are not in the expected kernel or module code
2149+
# regions are present.
21482150
# Corresponds to the JSON property `unexpectedKernelCodePages`
21492151
# @return [Boolean]
21502152
attr_accessor :unexpected_kernel_code_pages
21512153
alias_method :unexpected_kernel_code_pages?, :unexpected_kernel_code_pages
21522154

2153-
# Flag indicating presence of kprobe points with callbacks pointing to regions
2154-
# that are not in the expected kernel or module code range.
2155+
# True when `kprobe` points are present with callbacks pointing to regions that
2156+
# are not in the expected kernel or module code range.
21552157
# Corresponds to the JSON property `unexpectedKprobeHandler`
21562158
# @return [Boolean]
21572159
attr_accessor :unexpected_kprobe_handler
21582160
alias_method :unexpected_kprobe_handler?, :unexpected_kprobe_handler
21592161

2160-
# Flag indicating unexpected process(es) in the scheduler run-queue, those that
2161-
# are in the run-queue, but not in the process task-list.
2162+
# True when unexpected processes in the scheduler run queue are present. Such
2163+
# processes are in the run queue, but not in the process task list.
21622164
# Corresponds to the JSON property `unexpectedProcessesInRunqueue`
21632165
# @return [Boolean]
21642166
attr_accessor :unexpected_processes_in_runqueue
21652167
alias_method :unexpected_processes_in_runqueue?, :unexpected_processes_in_runqueue
21662168

2167-
# Flag indicating unexpected modifications of kernel read-only data memory.
2169+
# True when unexpected modifications of kernel read-only data memory are present.
21682170
# Corresponds to the JSON property `unexpectedReadOnlyDataModification`
21692171
# @return [Boolean]
21702172
attr_accessor :unexpected_read_only_data_modification
21712173
alias_method :unexpected_read_only_data_modification?, :unexpected_read_only_data_modification
21722174

2173-
# Flag indicating presence of system call handlers that are are not in the
2174-
# expected kernel, module code regions.
2175+
# True when system call handlers that are are not in the expected kernel or
2176+
# module code regions are present.
21752177
# Corresponds to the JSON property `unexpectedSystemCallHandler`
21762178
# @return [Boolean]
21772179
attr_accessor :unexpected_system_call_handler
@@ -2195,7 +2197,7 @@ def update!(**args)
21952197
end
21962198
end
21972199

2198-
# Kubernetes related attributes.
2200+
# Kubernetes-related attributes.
21992201
class Kubernetes
22002202
include Google::Apis::Core::Hashable
22012203

generated/google-apis-securitycenter_v1beta2/lib/google/apis/securitycenter_v1beta2/gem_version.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ module Google
1616
module Apis
1717
module SecuritycenterV1beta2
1818
# Version of the google-apis-securitycenter_v1beta2 gem
19-
GEM_VERSION = "0.41.0"
19+
GEM_VERSION = "0.42.0"
2020

2121
# Version of the code generator used to generate this client
2222
GENERATOR_VERSION = "0.11.0"
2323

2424
# Revision of the discovery document this client was generated from
25-
REVISION = "20221121"
25+
REVISION = "20221208"
2626
end
2727
end
2828
end

0 commit comments

Comments
 (0)