Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit c1a5947

Browse files
committedAug 4, 2023
feat(securitycenter): update the api
#### securitycenter:v1 The following keys were deleted: - resources.folders.resources.eventThreatDetectionSettings.methods.validateCustomModule (Total Keys: 12) - resources.folders.resources.eventThreatDetectionSettings.resources.customModules.methods.create (Total Keys: 12) - resources.folders.resources.eventThreatDetectionSettings.resources.customModules.methods.delete (Total Keys: 11) - resources.folders.resources.eventThreatDetectionSettings.resources.customModules.methods.get (Total Keys: 11) - resources.folders.resources.eventThreatDetectionSettings.resources.customModules.methods.list (Total Keys: 16) - resources.folders.resources.eventThreatDetectionSettings.resources.customModules.methods.patch (Total Keys: 15) - resources.projects.resources.eventThreatDetectionSettings.methods.validateCustomModule (Total Keys: 12) - resources.projects.resources.eventThreatDetectionSettings.resources.customModules.methods.create (Total Keys: 12) - resources.projects.resources.eventThreatDetectionSettings.resources.customModules.methods.delete (Total Keys: 11) - resources.projects.resources.eventThreatDetectionSettings.resources.customModules.methods.get (Total Keys: 11) - resources.projects.resources.eventThreatDetectionSettings.resources.customModules.methods.list (Total Keys: 16) - resources.projects.resources.eventThreatDetectionSettings.resources.customModules.methods.patch (Total Keys: 15) The following keys were added: - resources.organizations.resources.resourceValueConfigs.methods.batchCreate (Total Keys: 12) - resources.organizations.resources.resourceValueConfigs.methods.delete (Total Keys: 11) - resources.organizations.resources.resourceValueConfigs.methods.get (Total Keys: 11) - resources.organizations.resources.resourceValueConfigs.methods.list (Total Keys: 16) - resources.organizations.resources.resourceValueConfigs.methods.patch (Total Keys: 15) - resources.organizations.resources.simulations.methods.get (Total Keys: 11) - resources.organizations.resources.simulations.resources.attackExposureResults.resources.attackPaths.methods.list (Total Keys: 18) - resources.organizations.resources.simulations.resources.attackExposureResults.resources.valuedResources.methods.list (Total Keys: 18) - resources.organizations.resources.simulations.resources.attackPaths.methods.list (Total Keys: 18) - resources.organizations.resources.simulations.resources.valuedResources.methods.list (Total Keys: 18) - resources.organizations.resources.simulations.resources.valuedResources.resources.attackPaths.methods.list (Total Keys: 18) - schemas.AttackExposure (Total Keys: 14) - schemas.AttackPath (Total Keys: 21) - schemas.AttackStepNode (Total Keys: 7) - schemas.BatchCreateResourceValueConfigsRequest (Total Keys: 4) - schemas.BatchCreateResourceValueConfigsResponse (Total Keys: 4) - schemas.CreateResourceValueConfigRequest (Total Keys: 4) - schemas.Finding.properties.attackExposure.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig (Total Keys: 16) - schemas.ListAttackPathsResponse (Total Keys: 5) - schemas.ListResourceValueConfigsResponse (Total Keys: 5) - schemas.ListValuedResourcesResponse (Total Keys: 7) - schemas.PathNodeAssociatedFinding (Total Keys: 5) - schemas.ResourceValueConfigMetadata (Total Keys: 3) - schemas.Simulation (Total Keys: 8) - schemas.ValuedResource (Total Keys: 11) #### securitycenter:v1beta1 The following keys were added: - schemas.AttackExposure (Total Keys: 14) - schemas.Finding.properties.attackExposure.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig (Total Keys: 16) #### securitycenter:v1beta2 The following keys were added: - schemas.AttackExposure (Total Keys: 14) - schemas.Finding.properties.attackExposure.$ref (Total Keys: 1) - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig (Total Keys: 16)
1 parent d078ade commit c1a5947

19 files changed

+2789
-573
lines changed
 

‎docs/dyn/securitycenter_v1.folders.html

-5
Original file line numberDiff line numberDiff line change
@@ -84,11 +84,6 @@ <h2>Instance Methods</h2>
8484
</p>
8585
<p class="firstline">Returns the bigQueryExports Resource.</p>
8686

87-
<p class="toc_element">
88-
<code><a href="securitycenter_v1.folders.eventThreatDetectionSettings.html">eventThreatDetectionSettings()</a></code>
89-
</p>
90-
<p class="firstline">Returns the eventThreatDetectionSettings Resource.</p>
91-
9287
<p class="toc_element">
9388
<code><a href="securitycenter_v1.folders.findings.html">findings()</a></code>
9489
</p>

‎docs/dyn/securitycenter_v1.folders.sources.findings.html

+45
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,15 @@ <h3>Method Details</h3>
212212
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
213213
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
214214
},
215+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
216+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
217+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
218+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
219+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
220+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
221+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
222+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
223+
},
215224
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
216225
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
217226
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -613,6 +622,15 @@ <h3>Method Details</h3>
613622
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
614623
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
615624
},
625+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
626+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
627+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
628+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
629+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
630+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
631+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
632+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
633+
},
616634
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
617635
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
618636
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -977,6 +995,15 @@ <h3>Method Details</h3>
977995
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
978996
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
979997
},
998+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
999+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1000+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1001+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1002+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1003+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1004+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1005+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1006+
},
9801007
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
9811008
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
9821009
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -1354,6 +1381,15 @@ <h3>Method Details</h3>
13541381
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
13551382
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
13561383
},
1384+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
1385+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1386+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1387+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1388+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1389+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1390+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1391+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1392+
},
13571393
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
13581394
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
13591395
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -1732,6 +1768,15 @@ <h3>Method Details</h3>
17321768
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
17331769
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
17341770
},
1771+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
1772+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1773+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1774+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1775+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1776+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1777+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1778+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1779+
},
17351780
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
17361781
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
17371782
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.

‎docs/dyn/securitycenter_v1.organizations.eventThreatDetectionSettings.customModules.html

+15-15
Original file line numberDiff line numberDiff line change
@@ -79,22 +79,22 @@ <h2>Instance Methods</h2>
7979
<p class="firstline">Close httplib2 connections.</p>
8080
<p class="toc_element">
8181
<code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
82-
<p class="firstline">Creates an ETD custom module at the given level. Creating a module has a side-effect of creating modules at all descendants.</p>
82+
<p class="firstline">Creates an Event Threat Detection custom module.</p>
8383
<p class="toc_element">
8484
<code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
85-
<p class="firstline">Deletes an ETD custom module. Deletion at resident level also deletes modules at all descendants. Deletion at any other level is not supported.</p>
85+
<p class="firstline">Deletes an Event Threat Detection custom module.</p>
8686
<p class="toc_element">
8787
<code><a href="#get">get(name, x__xgafv=None)</a></code></p>
88-
<p class="firstline">Gets an ETD custom module. Retrieves the module at the given level.</p>
88+
<p class="firstline">Gets an Event Threat Detection custom module.</p>
8989
<p class="toc_element">
9090
<code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
91-
<p class="firstline">Lists ETD custom modules. Retrieve all resident and inherited modules at the given level (no descendants).</p>
91+
<p class="firstline">Lists Event Threat Detection custom modules.</p>
9292
<p class="toc_element">
9393
<code><a href="#list_next">list_next()</a></code></p>
9494
<p class="firstline">Retrieves the next page of results.</p>
9595
<p class="toc_element">
9696
<code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
97-
<p class="firstline">Updates an ETD custom module at the given level. All config fields can be updated when updating the module at resident level. Only enablement state can be updated when updating the module at inherited levels. Updating the module has a side-effect that it updates all descendants that are inherited from this module.</p>
97+
<p class="firstline">Updates an Event Threat Detection custom module.</p>
9898
<h3>Method Details</h3>
9999
<div class="method">
100100
<code class="details" id="close">close()</code>
@@ -103,10 +103,10 @@ <h3>Method Details</h3>
103103

104104
<div class="method">
105105
<code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
106-
<pre>Creates an ETD custom module at the given level. Creating a module has a side-effect of creating modules at all descendants.
106+
<pre>Creates an Event Threat Detection custom module.
107107

108108
Args:
109-
parent: string, Required. The new custom module&#x27;s parent. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings&quot;. * &quot;projects/{project}/eventThreatDetectionSettings&quot;. (required)
109+
parent: string, Required. The new custom module&#x27;s parent. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. (required)
110110
body: object, The request body.
111111
The object takes the form of:
112112

@@ -147,10 +147,10 @@ <h3>Method Details</h3>
147147

148148
<div class="method">
149149
<code class="details" id="delete">delete(name, x__xgafv=None)</code>
150-
<pre>Deletes an ETD custom module. Deletion at resident level also deletes modules at all descendants. Deletion at any other level is not supported.
150+
<pre>Deletes an Event Threat Detection custom module.
151151

152152
Args:
153-
name: string, Required. Name of the custom module to delete. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;projects/{project}/eventThreatDetectionSettings/customModules/{module}&quot;. (required)
153+
name: string, Required. Name of the custom module to delete. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings/customModules/{module}&quot;. (required)
154154
x__xgafv: string, V1 error format.
155155
Allowed values
156156
1 - v1 error format
@@ -165,10 +165,10 @@ <h3>Method Details</h3>
165165

166166
<div class="method">
167167
<code class="details" id="get">get(name, x__xgafv=None)</code>
168-
<pre>Gets an ETD custom module. Retrieves the module at the given level.
168+
<pre>Gets an Event Threat Detection custom module.
169169

170170
Args:
171-
name: string, Required. Name of the custom module to get. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;projects/{project}/eventThreatDetectionSettings/customModules/{module}&quot;. (required)
171+
name: string, Required. Name of the custom module to get. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings/customModules/{module}&quot;. (required)
172172
x__xgafv: string, V1 error format.
173173
Allowed values
174174
1 - v1 error format
@@ -193,10 +193,10 @@ <h3>Method Details</h3>
193193

194194
<div class="method">
195195
<code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
196-
<pre>Lists ETD custom modules. Retrieve all resident and inherited modules at the given level (no descendants).
196+
<pre>Lists Event Threat Detection custom modules.
197197

198198
Args:
199-
parent: string, Required. Name of the parent to list custom modules. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings&quot;. * &quot;projects/{project}/eventThreatDetectionSettings&quot;. (required)
199+
parent: string, Required. Name of the parent to list custom modules under. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. (required)
200200
pageSize: integer, The maximum number of modules to return. The service may return fewer than this value. If unspecified, at most 10 configs will be returned. The maximum value is 1000; values above 1000 will be coerced to 1000.
201201
pageToken: string, A page token, received from a previous `ListEventThreatDetectionCustomModules` call. Provide this to retrieve the subsequent page. When paginating, all other parameters provided to `ListEventThreatDetectionCustomModules` must match the call that provided the page token.
202202
x__xgafv: string, V1 error format.
@@ -207,7 +207,7 @@ <h3>Method Details</h3>
207207
Returns:
208208
An object of the form:
209209

210-
{ # Response for listing EventThreatDetectionCustomModules.
210+
{ # Response for listing Event Threat Detection custom modules.
211211
&quot;eventThreatDetectionCustomModules&quot;: [ # Custom modules belonging to the requested parent.
212212
{ # Represents an instance of an Event Threat Detection custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization level only.
213213
&quot;config&quot;: { # Config for the module. For the resident module, its config value is defined at this level. For the inherited module, its config value is inherited from the ancestor module.
@@ -242,7 +242,7 @@ <h3>Method Details</h3>
242242

243243
<div class="method">
244244
<code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
245-
<pre>Updates an ETD custom module at the given level. All config fields can be updated when updating the module at resident level. Only enablement state can be updated when updating the module at inherited levels. Updating the module has a side-effect that it updates all descendants that are inherited from this module.
245+
<pre>Updates an Event Threat Detection custom module.
246246

247247
Args:
248248
name: string, Immutable. The resource name of the Event Threat Detection custom module. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings/customModules/{module}&quot;. * &quot;projects/{project}/eventThreatDetectionSettings/customModules/{module}&quot;. (required)

‎docs/dyn/securitycenter_v1.organizations.eventThreatDetectionSettings.html

+5-5
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ <h2>Instance Methods</h2>
8484
<p class="firstline">Close httplib2 connections.</p>
8585
<p class="toc_element">
8686
<code><a href="#validateCustomModule">validateCustomModule(parent, body=None, x__xgafv=None)</a></code></p>
87-
<p class="firstline">Validates the given Event Threat Detection Custom Module.</p>
87+
<p class="firstline">Validates the given Event Threat Detection custom module.</p>
8888
<h3>Method Details</h3>
8989
<div class="method">
9090
<code class="details" id="close">close()</code>
@@ -93,14 +93,14 @@ <h3>Method Details</h3>
9393

9494
<div class="method">
9595
<code class="details" id="validateCustomModule">validateCustomModule(parent, body=None, x__xgafv=None)</code>
96-
<pre>Validates the given Event Threat Detection Custom Module.
96+
<pre>Validates the given Event Threat Detection custom module.
9797

9898
Args:
99-
parent: string, Required. Resource name of the parent to validate the Custom Module under. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. * &quot;folders/{folder}/eventThreatDetectionSettings&quot;. * &quot;projects/{project}/eventThreatDetectionSettings&quot;. (required)
99+
parent: string, Required. Resource name of the parent to validate the Custom Module under. Its format is: * &quot;organizations/{organization}/eventThreatDetectionSettings&quot;. (required)
100100
body: object, The request body.
101101
The object takes the form of:
102102

103-
{ # Request to validate an EventThreatDetectionCustomModule.
103+
{ # Request to validate an Event Threat Detection custom module.
104104
&quot;rawText&quot;: &quot;A String&quot;, # Required. The raw text of the module&#x27;s contents. Used to generate error messages.
105105
&quot;type&quot;: &quot;A String&quot;, # Required. The type of the module (e.g. CONFIGURABLE_BAD_IP).
106106
}
@@ -113,7 +113,7 @@ <h3>Method Details</h3>
113113
Returns:
114114
An object of the form:
115115

116-
{ # Response to validating an Event Threat Detection Custom Module.
116+
{ # Response to validating an Event Threat Detection custom module.
117117
&quot;errors&quot;: { # A list of zero or more errors encountered while validating the uploaded configuration of an Event Threat Detection Custom Module. # A list of errors returned by the validator. If the list is empty, there were no errors.
118118
&quot;errors&quot;: [
119119
{ # An error encountered while validating the uploaded configuration of an Event Threat Detection Custom Module.

‎docs/dyn/securitycenter_v1.organizations.html

+10
Original file line numberDiff line numberDiff line change
@@ -109,11 +109,21 @@ <h2>Instance Methods</h2>
109109
</p>
110110
<p class="firstline">Returns the operations Resource.</p>
111111

112+
<p class="toc_element">
113+
<code><a href="securitycenter_v1.organizations.resourceValueConfigs.html">resourceValueConfigs()</a></code>
114+
</p>
115+
<p class="firstline">Returns the resourceValueConfigs Resource.</p>
116+
112117
<p class="toc_element">
113118
<code><a href="securitycenter_v1.organizations.securityHealthAnalyticsSettings.html">securityHealthAnalyticsSettings()</a></code>
114119
</p>
115120
<p class="firstline">Returns the securityHealthAnalyticsSettings Resource.</p>
116121

122+
<p class="toc_element">
123+
<code><a href="securitycenter_v1.organizations.simulations.html">simulations()</a></code>
124+
</p>
125+
<p class="firstline">Returns the simulations Resource.</p>
126+
117127
<p class="toc_element">
118128
<code><a href="securitycenter_v1.organizations.sources.html">sources()</a></code>
119129
</p>

‎docs/dyn/securitycenter_v1.organizations.resourceValueConfigs.html

+317
Large diffs are not rendered by default.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.attackExposureResults.html">attackExposureResults</a> . <a href="securitycenter_v1.organizations.simulations.attackExposureResults.attackPaths.html">attackPaths</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="#close">close()</a></code></p>
79+
<p class="firstline">Close httplib2 connections.</p>
80+
<p class="toc_element">
81+
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
82+
<p class="firstline">Lists the attack paths for a set of simulation results or valued resources and filter.</p>
83+
<p class="toc_element">
84+
<code><a href="#list_next">list_next()</a></code></p>
85+
<p class="firstline">Retrieves the next page of results.</p>
86+
<h3>Method Details</h3>
87+
<div class="method">
88+
<code class="details" id="close">close()</code>
89+
<pre>Close httplib2 connections.</pre>
90+
</div>
91+
92+
<div class="method">
93+
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
94+
<pre>Lists the attack paths for a set of simulation results or valued resources and filter.
95+
96+
Args:
97+
parent: string, Required. Name of parent to list attack paths. Valid formats: &quot;organizations/{organization}&quot;, &quot;organizations/{organization}/simulations/{simulation}&quot; &quot;organizations/{organization}/simulations/{simulation}/attackExposureResults/{attack_exposure_result_v2}&quot; &quot;organizations/{organization}/simulations/{simulation}/valuedResources/{valued_resource}&quot; (required)
98+
filter: string, The filter expression that filters the attack path in the response. Supported fields: * `valued_resources` supports =
99+
pageSize: integer, The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.
100+
pageToken: string, The value returned by the last `ListAttackPathsResponse`; indicates that this is a continuation of a prior `ListAttackPaths` call, and that the system should return the next page of data.
101+
x__xgafv: string, V1 error format.
102+
Allowed values
103+
1 - v1 error format
104+
2 - v2 error format
105+
106+
Returns:
107+
An object of the form:
108+
109+
{ # Response message for listing the attack paths for a given simulation or valued resource.
110+
&quot;attackPaths&quot;: [ # The attack paths that the attack path simulation identified.
111+
{ # A path that an attacker could take to reach an exposed resource.
112+
&quot;edges&quot;: [ # A list of the edges between nodes in this attack path.
113+
{ # Represents a connection between a source node and a destination node in this attack path.
114+
&quot;destination&quot;: &quot;A String&quot;, # The attack node uuid of the destination node.
115+
&quot;source&quot;: &quot;A String&quot;, # The attack node uuid of the source node.
116+
},
117+
],
118+
&quot;name&quot;: &quot;A String&quot;, # The attack path name, for example, `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
119+
&quot;pathNodes&quot;: [ # A list of nodes that exist in this attack path.
120+
{ # Represents one point that an attacker passes through in this attack path.
121+
&quot;associatedFindings&quot;: [ # The findings associated with this node in the attack path.
122+
{ # A finding that is associated with this node in the attack path.
123+
&quot;canonicalFinding&quot;: &quot;A String&quot;, # Canonical name of the associated findings. Example: organizations/123/sources/456/findings/789
124+
&quot;findingCategory&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source.
125+
&quot;name&quot;: &quot;A String&quot;, # Full resource name of the finding.
126+
},
127+
],
128+
&quot;attackSteps&quot;: [ # A list of attack step nodes that exist in this attack path node.
129+
{ # Detailed steps the attack can take between path nodes.
130+
&quot;description&quot;: &quot;A String&quot;, # Attack step description
131+
&quot;displayName&quot;: &quot;A String&quot;, # User friendly name of the attack step
132+
&quot;labels&quot;: { # Attack step labels for metadata
133+
&quot;a_key&quot;: &quot;A String&quot;,
134+
},
135+
&quot;type&quot;: &quot;A String&quot;, # Attack step type. Can be either AND, OR or DEFENSE
136+
&quot;uuid&quot;: &quot;A String&quot;, # Unique ID for one Node
137+
},
138+
],
139+
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name of this resource.
140+
&quot;resource&quot;: &quot;A String&quot;, # The name of the resource at this point in the attack path. The format of the name follows the Cloud Asset Inventory [resource name format](&quot;https://cloud.google.com/asset-inventory/docs/resource-name-format&quot;)
141+
&quot;resourceType&quot;: &quot;A String&quot;, # The [supported resource type](http://cloud/asset-inventory/docs/supported-asset-types&quot;)
142+
&quot;uuid&quot;: &quot;A String&quot;, # Unique id of the attack path node.
143+
},
144+
],
145+
},
146+
],
147+
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results.
148+
}</pre>
149+
</div>
150+
151+
<div class="method">
152+
<code class="details" id="list_next">list_next()</code>
153+
<pre>Retrieves the next page of results.
154+
155+
Args:
156+
previous_request: The request for the previous page. (required)
157+
previous_response: The response from the request for the previous page. (required)
158+
159+
Returns:
160+
A request object that you can call &#x27;execute()&#x27; on to request the next
161+
page. Returns None if there are no more items in the collection.
162+
</pre>
163+
</div>
164+
165+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.attackExposureResults.html">attackExposureResults</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="securitycenter_v1.organizations.simulations.attackExposureResults.attackPaths.html">attackPaths()</a></code>
79+
</p>
80+
<p class="firstline">Returns the attackPaths Resource.</p>
81+
82+
<p class="toc_element">
83+
<code><a href="securitycenter_v1.organizations.simulations.attackExposureResults.valuedResources.html">valuedResources()</a></code>
84+
</p>
85+
<p class="firstline">Returns the valuedResources Resource.</p>
86+
87+
<p class="toc_element">
88+
<code><a href="#close">close()</a></code></p>
89+
<p class="firstline">Close httplib2 connections.</p>
90+
<h3>Method Details</h3>
91+
<div class="method">
92+
<code class="details" id="close">close()</code>
93+
<pre>Close httplib2 connections.</pre>
94+
</div>
95+
96+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.attackExposureResults.html">attackExposureResults</a> . <a href="securitycenter_v1.organizations.simulations.attackExposureResults.valuedResources.html">valuedResources</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="#close">close()</a></code></p>
79+
<p class="firstline">Close httplib2 connections.</p>
80+
<p class="toc_element">
81+
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
82+
<p class="firstline">Lists the valued resources for a set of simulation results and filter.</p>
83+
<p class="toc_element">
84+
<code><a href="#list_next">list_next()</a></code></p>
85+
<p class="firstline">Retrieves the next page of results.</p>
86+
<h3>Method Details</h3>
87+
<div class="method">
88+
<code class="details" id="close">close()</code>
89+
<pre>Close httplib2 connections.</pre>
90+
</div>
91+
92+
<div class="method">
93+
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
94+
<pre>Lists the valued resources for a set of simulation results and filter.
95+
96+
Args:
97+
parent: string, Required. Name of parent to list valued resources. Valid formats: &quot;organizations/{organization}&quot;, &quot;organizations/{organization}/simulations/{simulation}&quot; &quot;organizations/{organization}/simulations/{simulation}/attackExposureResults/{attack_exposure_result_v2}&quot; (required)
98+
filter: string, The filter expression that filters the valued resources in the response. Supported fields: * `resource_value` supports = * `resource_type` supports =
99+
pageSize: integer, The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.
100+
pageToken: string, The value returned by the last `ListValuedResourcesResponse`; indicates that this is a continuation of a prior `ListValuedResources` call, and that the system should return the next page of data.
101+
x__xgafv: string, V1 error format.
102+
Allowed values
103+
1 - v1 error format
104+
2 - v2 error format
105+
106+
Returns:
107+
An object of the form:
108+
109+
{ # Response message for listing the valued resources for a given simulation.
110+
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results.
111+
&quot;totalSize&quot;: 42, # The estimated total number of results matching the query.
112+
&quot;valuedResources&quot;: [ # The valued resources that the attack path simulation identified.
113+
{ # A resource that is determined to have value to a user&#x27;s system
114+
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name of the valued resource.
115+
&quot;exposedScore&quot;: 3.14, # Exposed score for this valued resource. A value of 0 means no exposure was detected exposure.
116+
&quot;name&quot;: &quot;A String&quot;, # Valued resource name, for example, e.g.: `organizations/123/simulations/456/valuedResources/789`
117+
&quot;resource&quot;: &quot;A String&quot;, # The [full resource name](https://cloud.google.com/apis/design/resource_names#full_resource_name) of the valued resource.
118+
&quot;resourceType&quot;: &quot;A String&quot;, # The [resource type](https://cloud.google.com/asset-inventory/docs/supported-asset-types) of the valued resource.
119+
&quot;resourceValue&quot;: &quot;A String&quot;, # How valuable this resource is.
120+
&quot;resourceValueConfigsUsed&quot;: [ # List of resource value configurations&#x27; metadata used to determine the value of this resource. Maximum of 100.
121+
{ # Metadata about a ResourceValueConfig. For example, id and name.
122+
&quot;name&quot;: &quot;A String&quot;, # Resource value config name
123+
},
124+
],
125+
},
126+
],
127+
}</pre>
128+
</div>
129+
130+
<div class="method">
131+
<code class="details" id="list_next">list_next()</code>
132+
<pre>Retrieves the next page of results.
133+
134+
Args:
135+
previous_request: The request for the previous page. (required)
136+
previous_response: The response from the request for the previous page. (required)
137+
138+
Returns:
139+
A request object that you can call &#x27;execute()&#x27; on to request the next
140+
page. Returns None if there are no more items in the collection.
141+
</pre>
142+
</div>
143+
144+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.attackPaths.html">attackPaths</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="#close">close()</a></code></p>
79+
<p class="firstline">Close httplib2 connections.</p>
80+
<p class="toc_element">
81+
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
82+
<p class="firstline">Lists the attack paths for a set of simulation results or valued resources and filter.</p>
83+
<p class="toc_element">
84+
<code><a href="#list_next">list_next()</a></code></p>
85+
<p class="firstline">Retrieves the next page of results.</p>
86+
<h3>Method Details</h3>
87+
<div class="method">
88+
<code class="details" id="close">close()</code>
89+
<pre>Close httplib2 connections.</pre>
90+
</div>
91+
92+
<div class="method">
93+
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
94+
<pre>Lists the attack paths for a set of simulation results or valued resources and filter.
95+
96+
Args:
97+
parent: string, Required. Name of parent to list attack paths. Valid formats: &quot;organizations/{organization}&quot;, &quot;organizations/{organization}/simulations/{simulation}&quot; &quot;organizations/{organization}/simulations/{simulation}/attackExposureResults/{attack_exposure_result_v2}&quot; &quot;organizations/{organization}/simulations/{simulation}/valuedResources/{valued_resource}&quot; (required)
98+
filter: string, The filter expression that filters the attack path in the response. Supported fields: * `valued_resources` supports =
99+
pageSize: integer, The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.
100+
pageToken: string, The value returned by the last `ListAttackPathsResponse`; indicates that this is a continuation of a prior `ListAttackPaths` call, and that the system should return the next page of data.
101+
x__xgafv: string, V1 error format.
102+
Allowed values
103+
1 - v1 error format
104+
2 - v2 error format
105+
106+
Returns:
107+
An object of the form:
108+
109+
{ # Response message for listing the attack paths for a given simulation or valued resource.
110+
&quot;attackPaths&quot;: [ # The attack paths that the attack path simulation identified.
111+
{ # A path that an attacker could take to reach an exposed resource.
112+
&quot;edges&quot;: [ # A list of the edges between nodes in this attack path.
113+
{ # Represents a connection between a source node and a destination node in this attack path.
114+
&quot;destination&quot;: &quot;A String&quot;, # The attack node uuid of the destination node.
115+
&quot;source&quot;: &quot;A String&quot;, # The attack node uuid of the source node.
116+
},
117+
],
118+
&quot;name&quot;: &quot;A String&quot;, # The attack path name, for example, `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
119+
&quot;pathNodes&quot;: [ # A list of nodes that exist in this attack path.
120+
{ # Represents one point that an attacker passes through in this attack path.
121+
&quot;associatedFindings&quot;: [ # The findings associated with this node in the attack path.
122+
{ # A finding that is associated with this node in the attack path.
123+
&quot;canonicalFinding&quot;: &quot;A String&quot;, # Canonical name of the associated findings. Example: organizations/123/sources/456/findings/789
124+
&quot;findingCategory&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source.
125+
&quot;name&quot;: &quot;A String&quot;, # Full resource name of the finding.
126+
},
127+
],
128+
&quot;attackSteps&quot;: [ # A list of attack step nodes that exist in this attack path node.
129+
{ # Detailed steps the attack can take between path nodes.
130+
&quot;description&quot;: &quot;A String&quot;, # Attack step description
131+
&quot;displayName&quot;: &quot;A String&quot;, # User friendly name of the attack step
132+
&quot;labels&quot;: { # Attack step labels for metadata
133+
&quot;a_key&quot;: &quot;A String&quot;,
134+
},
135+
&quot;type&quot;: &quot;A String&quot;, # Attack step type. Can be either AND, OR or DEFENSE
136+
&quot;uuid&quot;: &quot;A String&quot;, # Unique ID for one Node
137+
},
138+
],
139+
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name of this resource.
140+
&quot;resource&quot;: &quot;A String&quot;, # The name of the resource at this point in the attack path. The format of the name follows the Cloud Asset Inventory [resource name format](&quot;https://cloud.google.com/asset-inventory/docs/resource-name-format&quot;)
141+
&quot;resourceType&quot;: &quot;A String&quot;, # The [supported resource type](http://cloud/asset-inventory/docs/supported-asset-types&quot;)
142+
&quot;uuid&quot;: &quot;A String&quot;, # Unique id of the attack path node.
143+
},
144+
],
145+
},
146+
],
147+
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results.
148+
}</pre>
149+
</div>
150+
151+
<div class="method">
152+
<code class="details" id="list_next">list_next()</code>
153+
<pre>Retrieves the next page of results.
154+
155+
Args:
156+
previous_request: The request for the previous page. (required)
157+
previous_response: The response from the request for the previous page. (required)
158+
159+
Returns:
160+
A request object that you can call &#x27;execute()&#x27; on to request the next
161+
page. Returns None if there are no more items in the collection.
162+
</pre>
163+
</div>
164+
165+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="securitycenter_v1.organizations.simulations.attackExposureResults.html">attackExposureResults()</a></code>
79+
</p>
80+
<p class="firstline">Returns the attackExposureResults Resource.</p>
81+
82+
<p class="toc_element">
83+
<code><a href="securitycenter_v1.organizations.simulations.attackPaths.html">attackPaths()</a></code>
84+
</p>
85+
<p class="firstline">Returns the attackPaths Resource.</p>
86+
87+
<p class="toc_element">
88+
<code><a href="securitycenter_v1.organizations.simulations.valuedResources.html">valuedResources()</a></code>
89+
</p>
90+
<p class="firstline">Returns the valuedResources Resource.</p>
91+
92+
<p class="toc_element">
93+
<code><a href="#close">close()</a></code></p>
94+
<p class="firstline">Close httplib2 connections.</p>
95+
<p class="toc_element">
96+
<code><a href="#get">get(name, x__xgafv=None)</a></code></p>
97+
<p class="firstline">Get the simulation by name or the latest simulation for the given organization.</p>
98+
<h3>Method Details</h3>
99+
<div class="method">
100+
<code class="details" id="close">close()</code>
101+
<pre>Close httplib2 connections.</pre>
102+
</div>
103+
104+
<div class="method">
105+
<code class="details" id="get">get(name, x__xgafv=None)</code>
106+
<pre>Get the simulation by name or the latest simulation for the given organization.
107+
108+
Args:
109+
name: string, Required. The organization name or simulation name of this simulation Valid format: &quot;organizations/{organization}/simulations/latest&quot; &quot;organizations/{organization}/simulations/{simulation}&quot; (required)
110+
x__xgafv: string, V1 error format.
111+
Allowed values
112+
1 - v1 error format
113+
2 - v2 error format
114+
115+
Returns:
116+
An object of the form:
117+
118+
{ # Attack path simulation
119+
&quot;createTime&quot;: &quot;A String&quot;, # Output only. Time simulation was created
120+
&quot;name&quot;: &quot;A String&quot;, # Full resource name of the Simulation: organizations/123/simulations/456
121+
&quot;resourceValueConfigsMetadata&quot;: [ # Resource value configurations&#x27; metadata used in this simulation. Maximum of 100.
122+
{ # Metadata about a ResourceValueConfig. For example, id and name.
123+
&quot;name&quot;: &quot;A String&quot;, # Resource value config name
124+
},
125+
],
126+
}</pre>
127+
</div>
128+
129+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.valuedResources.html">valuedResources</a> . <a href="securitycenter_v1.organizations.simulations.valuedResources.attackPaths.html">attackPaths</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="#close">close()</a></code></p>
79+
<p class="firstline">Close httplib2 connections.</p>
80+
<p class="toc_element">
81+
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
82+
<p class="firstline">Lists the attack paths for a set of simulation results or valued resources and filter.</p>
83+
<p class="toc_element">
84+
<code><a href="#list_next">list_next()</a></code></p>
85+
<p class="firstline">Retrieves the next page of results.</p>
86+
<h3>Method Details</h3>
87+
<div class="method">
88+
<code class="details" id="close">close()</code>
89+
<pre>Close httplib2 connections.</pre>
90+
</div>
91+
92+
<div class="method">
93+
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
94+
<pre>Lists the attack paths for a set of simulation results or valued resources and filter.
95+
96+
Args:
97+
parent: string, Required. Name of parent to list attack paths. Valid formats: &quot;organizations/{organization}&quot;, &quot;organizations/{organization}/simulations/{simulation}&quot; &quot;organizations/{organization}/simulations/{simulation}/attackExposureResults/{attack_exposure_result_v2}&quot; &quot;organizations/{organization}/simulations/{simulation}/valuedResources/{valued_resource}&quot; (required)
98+
filter: string, The filter expression that filters the attack path in the response. Supported fields: * `valued_resources` supports =
99+
pageSize: integer, The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.
100+
pageToken: string, The value returned by the last `ListAttackPathsResponse`; indicates that this is a continuation of a prior `ListAttackPaths` call, and that the system should return the next page of data.
101+
x__xgafv: string, V1 error format.
102+
Allowed values
103+
1 - v1 error format
104+
2 - v2 error format
105+
106+
Returns:
107+
An object of the form:
108+
109+
{ # Response message for listing the attack paths for a given simulation or valued resource.
110+
&quot;attackPaths&quot;: [ # The attack paths that the attack path simulation identified.
111+
{ # A path that an attacker could take to reach an exposed resource.
112+
&quot;edges&quot;: [ # A list of the edges between nodes in this attack path.
113+
{ # Represents a connection between a source node and a destination node in this attack path.
114+
&quot;destination&quot;: &quot;A String&quot;, # The attack node uuid of the destination node.
115+
&quot;source&quot;: &quot;A String&quot;, # The attack node uuid of the source node.
116+
},
117+
],
118+
&quot;name&quot;: &quot;A String&quot;, # The attack path name, for example, `organizations/12/simulation/34/valuedResources/56/attackPaths/78`
119+
&quot;pathNodes&quot;: [ # A list of nodes that exist in this attack path.
120+
{ # Represents one point that an attacker passes through in this attack path.
121+
&quot;associatedFindings&quot;: [ # The findings associated with this node in the attack path.
122+
{ # A finding that is associated with this node in the attack path.
123+
&quot;canonicalFinding&quot;: &quot;A String&quot;, # Canonical name of the associated findings. Example: organizations/123/sources/456/findings/789
124+
&quot;findingCategory&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source.
125+
&quot;name&quot;: &quot;A String&quot;, # Full resource name of the finding.
126+
},
127+
],
128+
&quot;attackSteps&quot;: [ # A list of attack step nodes that exist in this attack path node.
129+
{ # Detailed steps the attack can take between path nodes.
130+
&quot;description&quot;: &quot;A String&quot;, # Attack step description
131+
&quot;displayName&quot;: &quot;A String&quot;, # User friendly name of the attack step
132+
&quot;labels&quot;: { # Attack step labels for metadata
133+
&quot;a_key&quot;: &quot;A String&quot;,
134+
},
135+
&quot;type&quot;: &quot;A String&quot;, # Attack step type. Can be either AND, OR or DEFENSE
136+
&quot;uuid&quot;: &quot;A String&quot;, # Unique ID for one Node
137+
},
138+
],
139+
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name of this resource.
140+
&quot;resource&quot;: &quot;A String&quot;, # The name of the resource at this point in the attack path. The format of the name follows the Cloud Asset Inventory [resource name format](&quot;https://cloud.google.com/asset-inventory/docs/resource-name-format&quot;)
141+
&quot;resourceType&quot;: &quot;A String&quot;, # The [supported resource type](http://cloud/asset-inventory/docs/supported-asset-types&quot;)
142+
&quot;uuid&quot;: &quot;A String&quot;, # Unique id of the attack path node.
143+
},
144+
],
145+
},
146+
],
147+
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results.
148+
}</pre>
149+
</div>
150+
151+
<div class="method">
152+
<code class="details" id="list_next">list_next()</code>
153+
<pre>Retrieves the next page of results.
154+
155+
Args:
156+
previous_request: The request for the previous page. (required)
157+
previous_response: The response from the request for the previous page. (required)
158+
159+
Returns:
160+
A request object that you can call &#x27;execute()&#x27; on to request the next
161+
page. Returns None if there are no more items in the collection.
162+
</pre>
163+
</div>
164+
165+
</body></html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,149 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="securitycenter_v1.html">Security Command Center API</a> . <a href="securitycenter_v1.organizations.html">organizations</a> . <a href="securitycenter_v1.organizations.simulations.html">simulations</a> . <a href="securitycenter_v1.organizations.simulations.valuedResources.html">valuedResources</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="securitycenter_v1.organizations.simulations.valuedResources.attackPaths.html">attackPaths()</a></code>
79+
</p>
80+
<p class="firstline">Returns the attackPaths Resource.</p>
81+
82+
<p class="toc_element">
83+
<code><a href="#close">close()</a></code></p>
84+
<p class="firstline">Close httplib2 connections.</p>
85+
<p class="toc_element">
86+
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
87+
<p class="firstline">Lists the valued resources for a set of simulation results and filter.</p>
88+
<p class="toc_element">
89+
<code><a href="#list_next">list_next()</a></code></p>
90+
<p class="firstline">Retrieves the next page of results.</p>
91+
<h3>Method Details</h3>
92+
<div class="method">
93+
<code class="details" id="close">close()</code>
94+
<pre>Close httplib2 connections.</pre>
95+
</div>
96+
97+
<div class="method">
98+
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
99+
<pre>Lists the valued resources for a set of simulation results and filter.
100+
101+
Args:
102+
parent: string, Required. Name of parent to list valued resources. Valid formats: &quot;organizations/{organization}&quot;, &quot;organizations/{organization}/simulations/{simulation}&quot; &quot;organizations/{organization}/simulations/{simulation}/attackExposureResults/{attack_exposure_result_v2}&quot; (required)
103+
filter: string, The filter expression that filters the valued resources in the response. Supported fields: * `resource_value` supports = * `resource_type` supports =
104+
pageSize: integer, The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.
105+
pageToken: string, The value returned by the last `ListValuedResourcesResponse`; indicates that this is a continuation of a prior `ListValuedResources` call, and that the system should return the next page of data.
106+
x__xgafv: string, V1 error format.
107+
Allowed values
108+
1 - v1 error format
109+
2 - v2 error format
110+
111+
Returns:
112+
An object of the form:
113+
114+
{ # Response message for listing the valued resources for a given simulation.
115+
&quot;nextPageToken&quot;: &quot;A String&quot;, # Token to retrieve the next page of results, or empty if there are no more results.
116+
&quot;totalSize&quot;: 42, # The estimated total number of results matching the query.
117+
&quot;valuedResources&quot;: [ # The valued resources that the attack path simulation identified.
118+
{ # A resource that is determined to have value to a user&#x27;s system
119+
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name of the valued resource.
120+
&quot;exposedScore&quot;: 3.14, # Exposed score for this valued resource. A value of 0 means no exposure was detected exposure.
121+
&quot;name&quot;: &quot;A String&quot;, # Valued resource name, for example, e.g.: `organizations/123/simulations/456/valuedResources/789`
122+
&quot;resource&quot;: &quot;A String&quot;, # The [full resource name](https://cloud.google.com/apis/design/resource_names#full_resource_name) of the valued resource.
123+
&quot;resourceType&quot;: &quot;A String&quot;, # The [resource type](https://cloud.google.com/asset-inventory/docs/supported-asset-types) of the valued resource.
124+
&quot;resourceValue&quot;: &quot;A String&quot;, # How valuable this resource is.
125+
&quot;resourceValueConfigsUsed&quot;: [ # List of resource value configurations&#x27; metadata used to determine the value of this resource. Maximum of 100.
126+
{ # Metadata about a ResourceValueConfig. For example, id and name.
127+
&quot;name&quot;: &quot;A String&quot;, # Resource value config name
128+
},
129+
],
130+
},
131+
],
132+
}</pre>
133+
</div>
134+
135+
<div class="method">
136+
<code class="details" id="list_next">list_next()</code>
137+
<pre>Retrieves the next page of results.
138+
139+
Args:
140+
previous_request: The request for the previous page. (required)
141+
previous_response: The response from the request for the previous page. (required)
142+
143+
Returns:
144+
A request object that you can call &#x27;execute()&#x27; on to request the next
145+
page. Returns None if there are no more items in the collection.
146+
</pre>
147+
</div>
148+
149+
</body></html>

‎docs/dyn/securitycenter_v1.organizations.sources.findings.html

+63
Large diffs are not rendered by default.

‎docs/dyn/securitycenter_v1.projects.html

-5
Original file line numberDiff line numberDiff line change
@@ -84,11 +84,6 @@ <h2>Instance Methods</h2>
8484
</p>
8585
<p class="firstline">Returns the bigQueryExports Resource.</p>
8686

87-
<p class="toc_element">
88-
<code><a href="securitycenter_v1.projects.eventThreatDetectionSettings.html">eventThreatDetectionSettings()</a></code>
89-
</p>
90-
<p class="firstline">Returns the eventThreatDetectionSettings Resource.</p>
91-
9287
<p class="toc_element">
9388
<code><a href="securitycenter_v1.projects.findings.html">findings()</a></code>
9489
</p>

‎docs/dyn/securitycenter_v1.projects.sources.findings.html

+45
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,15 @@ <h3>Method Details</h3>
212212
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
213213
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
214214
},
215+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
216+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
217+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
218+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
219+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
220+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
221+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
222+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
223+
},
215224
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
216225
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
217226
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -613,6 +622,15 @@ <h3>Method Details</h3>
613622
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
614623
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
615624
},
625+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
626+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
627+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
628+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
629+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
630+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
631+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
632+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
633+
},
616634
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
617635
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
618636
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -977,6 +995,15 @@ <h3>Method Details</h3>
977995
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
978996
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
979997
},
998+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
999+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1000+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1001+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1002+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1003+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1004+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1005+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1006+
},
9801007
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
9811008
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
9821009
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -1354,6 +1381,15 @@ <h3>Method Details</h3>
13541381
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
13551382
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
13561383
},
1384+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
1385+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1386+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1387+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1388+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1389+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1390+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1391+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1392+
},
13571393
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
13581394
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
13591395
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.
@@ -1732,6 +1768,15 @@ <h3>Method Details</h3>
17321768
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
17331769
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
17341770
},
1771+
&quot;attackExposure&quot;: { # An attack exposure contains the results of an attack path simulation run. # The results of an attack path simulation relevant to this finding.
1772+
&quot;attackExposureResult&quot;: &quot;A String&quot;, # The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456
1773+
&quot;exposedHighValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1774+
&quot;exposedLowValueResourcesCount&quot;: 42, # The number of high value resources that are exposed as a result of this finding.
1775+
&quot;exposedMediumValueResourcesCount&quot;: 42, # The number of medium value resources that are exposed as a result of this finding.
1776+
&quot;latestCalculationTime&quot;: &quot;A String&quot;, # The most recent time the attack exposure was updated on this finding.
1777+
&quot;score&quot;: 3.14, # A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.
1778+
&quot;state&quot;: &quot;A String&quot;, # What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.
1779+
},
17351780
&quot;canonicalName&quot;: &quot;A String&quot;, # The canonical name of the finding. It&#x27;s either &quot;organizations/{organization_id}/sources/{source_id}/findings/{finding_id}&quot;, &quot;folders/{folder_id}/sources/{source_id}/findings/{finding_id}&quot; or &quot;projects/{project_number}/sources/{source_id}/findings/{finding_id}&quot;, depending on the closest CRM ancestor of the resource associated with the finding.
17361781
&quot;category&quot;: &quot;A String&quot;, # The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: &quot;XSS_FLASH_INJECTION&quot;
17371782
&quot;cloudDlpDataProfile&quot;: { # The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding. # Cloud DLP data profile that is associated with the finding.

‎googleapiclient/discovery_cache/documents/securitycenter.v1.json

+1,032-541
Large diffs are not rendered by default.

‎googleapiclient/discovery_cache/documents/securitycenter.v1beta1.json

+122-1
Original file line numberDiff line numberDiff line change
@@ -896,7 +896,7 @@
896896
}
897897
}
898898
},
899-
"revision": "20230721",
899+
"revision": "20230727",
900900
"rootUrl": "https://securitycenter.googleapis.com/",
901901
"schemas": {
902902
"Access": {
@@ -1052,6 +1052,56 @@
10521052
},
10531053
"type": "object"
10541054
},
1055+
"AttackExposure": {
1056+
"description": "An attack exposure contains the results of an attack path simulation run.",
1057+
"id": "AttackExposure",
1058+
"properties": {
1059+
"attackExposureResult": {
1060+
"description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456",
1061+
"type": "string"
1062+
},
1063+
"exposedHighValueResourcesCount": {
1064+
"description": "The number of high value resources that are exposed as a result of this finding.",
1065+
"format": "int32",
1066+
"type": "integer"
1067+
},
1068+
"exposedLowValueResourcesCount": {
1069+
"description": "The number of high value resources that are exposed as a result of this finding.",
1070+
"format": "int32",
1071+
"type": "integer"
1072+
},
1073+
"exposedMediumValueResourcesCount": {
1074+
"description": "The number of medium value resources that are exposed as a result of this finding.",
1075+
"format": "int32",
1076+
"type": "integer"
1077+
},
1078+
"latestCalculationTime": {
1079+
"description": "The most recent time the attack exposure was updated on this finding.",
1080+
"format": "google-datetime",
1081+
"type": "string"
1082+
},
1083+
"score": {
1084+
"description": "A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.",
1085+
"format": "double",
1086+
"type": "number"
1087+
},
1088+
"state": {
1089+
"description": "What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.",
1090+
"enum": [
1091+
"STATE_UNSPECIFIED",
1092+
"CALCULATED",
1093+
"NOT_CALCULATED"
1094+
],
1095+
"enumDescriptions": [
1096+
"The state is not specified.",
1097+
"The attack exposure has been calculated.",
1098+
"The attack exposure has not been calculated."
1099+
],
1100+
"type": "string"
1101+
}
1102+
},
1103+
"type": "object"
1104+
},
10551105
"AuditConfig": {
10561106
"description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:jose@example.com\" ] }, { \"log_type\": \"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } ] }, { \"service\": \"sampleservice.googleapis.com\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:aliya@example.com\" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.",
10571107
"id": "AuditConfig",
@@ -1636,6 +1686,10 @@
16361686
"$ref": "Access",
16371687
"description": "Access details associated with the finding, such as more information on the caller, which method was accessed, and from where."
16381688
},
1689+
"attackExposure": {
1690+
"$ref": "AttackExposure",
1691+
"description": "The results of an attack path simulation relevant to this finding."
1692+
},
16391693
"canonicalName": {
16401694
"description": "The canonical name of the finding. It's either \"organizations/{organization_id}/sources/{source_id}/findings/{finding_id}\", \"folders/{folder_id}/sources/{source_id}/findings/{finding_id}\" or \"projects/{project_number}/sources/{source_id}/findings/{finding_id}\", depending on the closest CRM ancestor of the resource associated with the finding.",
16411695
"type": "string"
@@ -2259,6 +2313,73 @@
22592313
},
22602314
"type": "object"
22612315
},
2316+
"GoogleCloudSecuritycenterV1ResourceValueConfig": {
2317+
"description": "A resource value config is a mapping configuration of user's tag values to resource values. Used by the attack path simulation.",
2318+
"id": "GoogleCloudSecuritycenterV1ResourceValueConfig",
2319+
"properties": {
2320+
"createTime": {
2321+
"description": "Output only. Timestamp this resource value config was created.",
2322+
"format": "google-datetime",
2323+
"readOnly": true,
2324+
"type": "string"
2325+
},
2326+
"description": {
2327+
"description": "Description of the resource value config.",
2328+
"type": "string"
2329+
},
2330+
"name": {
2331+
"description": "Name for the resource value config",
2332+
"type": "string"
2333+
},
2334+
"resourceLabelsSelector": {
2335+
"additionalProperties": {
2336+
"type": "string"
2337+
},
2338+
"description": "List of resource labels to search for, evaluated with AND. E.g. \"resource_labels_selector\": {\"key\": \"value\", \"env\": \"prod\"} will match resources with labels \"key\": \"value\" AND \"env\": \"prod\" https://cloud.google.com/resource-manager/docs/creating-managing-labels",
2339+
"type": "object"
2340+
},
2341+
"resourceType": {
2342+
"description": "Apply resource_value only to resources that match resource_type. resource_type will be checked with \"AND\" of other resources. E.g. \"storage.googleapis.com/Bucket\" with resource_value \"HIGH\" will apply \"HIGH\" value only to \"storage.googleapis.com/Bucket\" resources.",
2343+
"type": "string"
2344+
},
2345+
"resourceValue": {
2346+
"description": "Required. Resource value level this expression represents",
2347+
"enum": [
2348+
"RESOURCE_VALUE_UNSPECIFIED",
2349+
"HIGH",
2350+
"MEDIUM",
2351+
"LOW",
2352+
"NONE"
2353+
],
2354+
"enumDescriptions": [
2355+
"Unspecific value",
2356+
"High resource value",
2357+
"Medium resource value",
2358+
"Low resource value",
2359+
"No resource value, e.g. ignore these resources"
2360+
],
2361+
"type": "string"
2362+
},
2363+
"scope": {
2364+
"description": "Project or folder to scope this config to. For example, \"project/456\" would apply this config only to resources in \"project/456\" scope will be checked with \"AND\" of other resources.",
2365+
"type": "string"
2366+
},
2367+
"tagValues": {
2368+
"description": "Required. Tag values combined with AND to check against. Values in the form \"tagValues/123\" E.g. [ \"tagValues/123\", \"tagValues/456\", \"tagValues/789\" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing",
2369+
"items": {
2370+
"type": "string"
2371+
},
2372+
"type": "array"
2373+
},
2374+
"updateTime": {
2375+
"description": "Output only. Timestamp this resource value config was last updated.",
2376+
"format": "google-datetime",
2377+
"readOnly": true,
2378+
"type": "string"
2379+
}
2380+
},
2381+
"type": "object"
2382+
},
22622383
"GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse": {
22632384
"description": "Response of asset discovery run",
22642385
"id": "GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse",

‎googleapiclient/discovery_cache/documents/securitycenter.v1beta2.json

+122-1
Original file line numberDiff line numberDiff line change
@@ -1981,7 +1981,7 @@
19811981
}
19821982
}
19831983
},
1984-
"revision": "20230721",
1984+
"revision": "20230727",
19851985
"rootUrl": "https://securitycenter.googleapis.com/",
19861986
"schemas": {
19871987
"Access": {
@@ -2073,6 +2073,56 @@
20732073
},
20742074
"type": "object"
20752075
},
2076+
"AttackExposure": {
2077+
"description": "An attack exposure contains the results of an attack path simulation run.",
2078+
"id": "AttackExposure",
2079+
"properties": {
2080+
"attackExposureResult": {
2081+
"description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456",
2082+
"type": "string"
2083+
},
2084+
"exposedHighValueResourcesCount": {
2085+
"description": "The number of high value resources that are exposed as a result of this finding.",
2086+
"format": "int32",
2087+
"type": "integer"
2088+
},
2089+
"exposedLowValueResourcesCount": {
2090+
"description": "The number of high value resources that are exposed as a result of this finding.",
2091+
"format": "int32",
2092+
"type": "integer"
2093+
},
2094+
"exposedMediumValueResourcesCount": {
2095+
"description": "The number of medium value resources that are exposed as a result of this finding.",
2096+
"format": "int32",
2097+
"type": "integer"
2098+
},
2099+
"latestCalculationTime": {
2100+
"description": "The most recent time the attack exposure was updated on this finding.",
2101+
"format": "google-datetime",
2102+
"type": "string"
2103+
},
2104+
"score": {
2105+
"description": "A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.",
2106+
"format": "double",
2107+
"type": "number"
2108+
},
2109+
"state": {
2110+
"description": "What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.",
2111+
"enum": [
2112+
"STATE_UNSPECIFIED",
2113+
"CALCULATED",
2114+
"NOT_CALCULATED"
2115+
],
2116+
"enumDescriptions": [
2117+
"The state is not specified.",
2118+
"The attack exposure has been calculated.",
2119+
"The attack exposure has not been calculated."
2120+
],
2121+
"type": "string"
2122+
}
2123+
},
2124+
"type": "object"
2125+
},
20762126
"CloudDlpDataProfile": {
20772127
"description": "The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding.",
20782128
"id": "CloudDlpDataProfile",
@@ -2728,6 +2778,10 @@
27282778
"$ref": "Access",
27292779
"description": "Access details associated with the finding, such as more information on the caller, which method was accessed, and from where."
27302780
},
2781+
"attackExposure": {
2782+
"$ref": "AttackExposure",
2783+
"description": "The results of an attack path simulation relevant to this finding."
2784+
},
27312785
"canonicalName": {
27322786
"description": "The canonical name of the finding. It's either \"organizations/{organization_id}/sources/{source_id}/findings/{finding_id}\", \"folders/{folder_id}/sources/{source_id}/findings/{finding_id}\" or \"projects/{project_number}/sources/{source_id}/findings/{finding_id}\", depending on the closest CRM ancestor of the resource associated with the finding.",
27332787
"type": "string"
@@ -3328,6 +3382,73 @@
33283382
},
33293383
"type": "object"
33303384
},
3385+
"GoogleCloudSecuritycenterV1ResourceValueConfig": {
3386+
"description": "A resource value config is a mapping configuration of user's tag values to resource values. Used by the attack path simulation.",
3387+
"id": "GoogleCloudSecuritycenterV1ResourceValueConfig",
3388+
"properties": {
3389+
"createTime": {
3390+
"description": "Output only. Timestamp this resource value config was created.",
3391+
"format": "google-datetime",
3392+
"readOnly": true,
3393+
"type": "string"
3394+
},
3395+
"description": {
3396+
"description": "Description of the resource value config.",
3397+
"type": "string"
3398+
},
3399+
"name": {
3400+
"description": "Name for the resource value config",
3401+
"type": "string"
3402+
},
3403+
"resourceLabelsSelector": {
3404+
"additionalProperties": {
3405+
"type": "string"
3406+
},
3407+
"description": "List of resource labels to search for, evaluated with AND. E.g. \"resource_labels_selector\": {\"key\": \"value\", \"env\": \"prod\"} will match resources with labels \"key\": \"value\" AND \"env\": \"prod\" https://cloud.google.com/resource-manager/docs/creating-managing-labels",
3408+
"type": "object"
3409+
},
3410+
"resourceType": {
3411+
"description": "Apply resource_value only to resources that match resource_type. resource_type will be checked with \"AND\" of other resources. E.g. \"storage.googleapis.com/Bucket\" with resource_value \"HIGH\" will apply \"HIGH\" value only to \"storage.googleapis.com/Bucket\" resources.",
3412+
"type": "string"
3413+
},
3414+
"resourceValue": {
3415+
"description": "Required. Resource value level this expression represents",
3416+
"enum": [
3417+
"RESOURCE_VALUE_UNSPECIFIED",
3418+
"HIGH",
3419+
"MEDIUM",
3420+
"LOW",
3421+
"NONE"
3422+
],
3423+
"enumDescriptions": [
3424+
"Unspecific value",
3425+
"High resource value",
3426+
"Medium resource value",
3427+
"Low resource value",
3428+
"No resource value, e.g. ignore these resources"
3429+
],
3430+
"type": "string"
3431+
},
3432+
"scope": {
3433+
"description": "Project or folder to scope this config to. For example, \"project/456\" would apply this config only to resources in \"project/456\" scope will be checked with \"AND\" of other resources.",
3434+
"type": "string"
3435+
},
3436+
"tagValues": {
3437+
"description": "Required. Tag values combined with AND to check against. Values in the form \"tagValues/123\" E.g. [ \"tagValues/123\", \"tagValues/456\", \"tagValues/789\" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing",
3438+
"items": {
3439+
"type": "string"
3440+
},
3441+
"type": "array"
3442+
},
3443+
"updateTime": {
3444+
"description": "Output only. Timestamp this resource value config was last updated.",
3445+
"format": "google-datetime",
3446+
"readOnly": true,
3447+
"type": "string"
3448+
}
3449+
},
3450+
"type": "object"
3451+
},
33313452
"GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse": {
33323453
"description": "Response of asset discovery run",
33333454
"id": "GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse",

0 commit comments

Comments
 (0)
Please sign in to comment.