Skip to content

chore: Update discovery artifacts #2590

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
53 commits
Select commit Hold shift + click to select a range
5d27fd5
chore: update docs/dyn/index.md
yoshi-automation Apr 1, 2025
1d949e1
feat(admin): update the api
yoshi-automation Apr 1, 2025
b71638c
feat(aiplatform): update the api
yoshi-automation Apr 1, 2025
d2fbe20
feat(alloydb): update the api
yoshi-automation Apr 1, 2025
d062d76
feat(analyticshub): update the api
yoshi-automation Apr 1, 2025
491ecf6
feat(beyondcorp): update the api
yoshi-automation Apr 1, 2025
bfec019
feat(bigquerydatatransfer): update the api
yoshi-automation Apr 1, 2025
d644ef9
feat(chromepolicy): update the api
yoshi-automation Apr 1, 2025
bf0bc27
feat(cloudbuild): update the api
yoshi-automation Apr 1, 2025
b84ad39
feat(cloudfunctions): update the api
yoshi-automation Apr 1, 2025
4f8f602
feat(connectors): update the api
yoshi-automation Apr 1, 2025
a422740
feat(contactcenteraiplatform): update the api
yoshi-automation Apr 1, 2025
986114d
feat(container): update the api
yoshi-automation Apr 1, 2025
8827d36
feat(dataform): update the api
yoshi-automation Apr 1, 2025
51dd9cf
fix(datalineage): update the api
yoshi-automation Apr 1, 2025
6ebc9eb
feat(datamigration): update the api
yoshi-automation Apr 1, 2025
a394bb9
feat(dataplex): update the api
yoshi-automation Apr 1, 2025
3142525
feat(datastream): update the api
yoshi-automation Apr 1, 2025
fdfe764
feat(deploymentmanager): update the api
yoshi-automation Apr 1, 2025
dad44ab
feat(developerconnect): update the api
yoshi-automation Apr 1, 2025
b282c78
feat(dialogflow): update the api
yoshi-automation Apr 1, 2025
f8ca7a1
feat(discoveryengine): update the api
yoshi-automation Apr 1, 2025
147dbf9
feat(firebasedataconnect): update the api
yoshi-automation Apr 1, 2025
ca736ee
feat(firebaseml): update the api
yoshi-automation Apr 1, 2025
9f522b9
feat(gkehub): update the api
yoshi-automation Apr 1, 2025
45813e7
feat(gkeonprem): update the api
yoshi-automation Apr 1, 2025
6844441
feat(iam): update the api
yoshi-automation Apr 1, 2025
a9bb8e0
feat(ids): update the api
yoshi-automation Apr 1, 2025
b60033c
feat(managedkafka): update the api
yoshi-automation Apr 1, 2025
c54bfd4
feat(metastore): update the api
yoshi-automation Apr 1, 2025
f8e8c6e
feat(migrationcenter): update the api
yoshi-automation Apr 1, 2025
53862a5
feat(monitoring): update the api
yoshi-automation Apr 1, 2025
81e4576
feat(networkconnectivity): update the api
yoshi-automation Apr 1, 2025
6dc7106
feat(networkservices): update the api
yoshi-automation Apr 1, 2025
e85c958
feat(notebooks): update the api
yoshi-automation Apr 1, 2025
6b4f7ba
feat(observability): update the api
yoshi-automation Apr 1, 2025
2007fca
feat(oracledatabase): update the api
yoshi-automation Apr 1, 2025
d6cf16f
feat(osconfig): update the api
yoshi-automation Apr 1, 2025
eba9792
feat(parallelstore): update the api
yoshi-automation Apr 1, 2025
1886f90
feat(paymentsresellersubscription): update the api
yoshi-automation Apr 1, 2025
31165ad
feat(policysimulator): update the api
yoshi-automation Apr 1, 2025
6c2b636
feat(rapidmigrationassessment): update the api
yoshi-automation Apr 1, 2025
7482f9a
feat(recommender): update the api
yoshi-automation Apr 1, 2025
99c6007
feat(redis): update the api
yoshi-automation Apr 1, 2025
6aacadb
feat(run): update the api
yoshi-automation Apr 1, 2025
cb3189a
feat(secretmanager): update the api
yoshi-automation Apr 1, 2025
a379c71
feat(securitycenter): update the api
yoshi-automation Apr 1, 2025
a0aa76f
feat(servicedirectory): update the api
yoshi-automation Apr 1, 2025
dcfada6
feat(testing): update the api
yoshi-automation Apr 1, 2025
5239938
feat(tpu): update the api
yoshi-automation Apr 1, 2025
890a341
feat(vmmigration): update the api
yoshi-automation Apr 1, 2025
a4e95cb
feat(workloadmanager): update the api
yoshi-automation Apr 1, 2025
9f3850e
chore(docs): Add new discovery artifacts and artifacts with minor upd…
yoshi-automation Apr 1, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
feat(securitycenter): update the api
#### securitycenter:v1

The following keys were added:
- schemas.AffectedResources (Total Keys: 4)
- schemas.Finding.properties.affectedResources.$ref (Total Keys: 1)
- schemas.GoogleCloudSecuritycenterV2AffectedResources (Total Keys: 4)
- schemas.GoogleCloudSecuritycenterV2Finding.properties.affectedResources.$ref (Total Keys: 1)

#### securitycenter:v1beta1

The following keys were added:
- schemas.AffectedResources (Total Keys: 4)
- schemas.Finding.properties.affectedResources.$ref (Total Keys: 1)
- schemas.GoogleCloudSecuritycenterV2AffectedResources (Total Keys: 4)
- schemas.GoogleCloudSecuritycenterV2Finding.properties.affectedResources.$ref (Total Keys: 1)

#### securitycenter:v1beta2

The following keys were added:
- schemas.AffectedResources (Total Keys: 4)
- schemas.Finding.properties.affectedResources.$ref (Total Keys: 1)
- schemas.GoogleCloudSecuritycenterV2AffectedResources (Total Keys: 4)
- schemas.GoogleCloudSecuritycenterV2Finding.properties.affectedResources.$ref (Total Keys: 1)
  • Loading branch information
yoshi-automation committed Apr 1, 2025
commit a379c71f2811c0513176920e40a7983af35f01a9
Original file line number Diff line number Diff line change
Expand Up @@ -643,6 +643,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down
15 changes: 15 additions & 0 deletions docs/dyn/securitycenter_v1.folders.sources.findings.html
Original file line number Diff line number Diff line change
Expand Up @@ -212,6 +212,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -955,6 +958,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -1612,6 +1618,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -2282,6 +2291,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -2953,6 +2965,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -643,6 +643,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down
21 changes: 21 additions & 0 deletions docs/dyn/securitycenter_v1.organizations.sources.findings.html
Original file line number Diff line number Diff line change
Expand Up @@ -145,6 +145,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -802,6 +805,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -1530,6 +1536,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -2273,6 +2282,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -2930,6 +2942,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -3600,6 +3615,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down Expand Up @@ -4271,6 +4289,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -643,6 +643,9 @@ <h3>Method Details</h3>
&quot;userAgentFamily&quot;: &quot;A String&quot;, # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
&quot;userName&quot;: &quot;A String&quot;, # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
},
&quot;affectedResources&quot;: { # Details about resources affected by this finding. # AffectedResources associated with the finding.
&quot;count&quot;: &quot;A String&quot;, # The count of resources affected by the finding.
},
&quot;application&quot;: { # Represents an application associated with a finding. # Represents an application associated with the finding.
&quot;baseUri&quot;: &quot;A String&quot;, # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
&quot;fullUri&quot;: &quot;A String&quot;, # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Expand Down
Loading