This repository has been archived by the owner on Jul 20, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: GoogleAdsError missing using generator version after 1.3.0
[PR](googleapis/gapic-generator-typescript#878) within updated gapic-generator-typescript version 1.4.0 Committer: @summer-ji-eng PiperOrigin-RevId: 375759421 Source-Link: googleapis/googleapis@95fa72f Source-Link: https://github.com/googleapis/googleapis-gen/commit/f40a34377ad488a7c2bc3992b3c8d5faf5a15c46
- Loading branch information
1 parent
05f7b59
commit 6bfc7e3
Showing
72 changed files
with
16,854 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
Websecurityscanner: Nodejs Client |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
{ | ||
"recurse": true, | ||
"skip": [ | ||
"https://codecov.io/gh/googleapis/", | ||
"www.googleapis.com", | ||
"img.shields.io" | ||
], | ||
"silent": true, | ||
"concurrency": 10 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
{ | ||
"name": "@google-cloud/web-security-scanner", | ||
"version": "0.1.0", | ||
"description": "Websecurityscanner client for Node.js", | ||
"repository": "googleapis/nodejs-websecurityscanner", | ||
"license": "Apache-2.0", | ||
"author": "Google LLC", | ||
"main": "build/src/index.js", | ||
"files": [ | ||
"build/src", | ||
"build/protos" | ||
], | ||
"keywords": [ | ||
"google apis client", | ||
"google api client", | ||
"google apis", | ||
"google api", | ||
"google", | ||
"google cloud platform", | ||
"google cloud", | ||
"cloud", | ||
"google websecurityscanner", | ||
"websecurityscanner", | ||
"web security scanner" | ||
], | ||
"scripts": { | ||
"clean": "gts clean", | ||
"compile": "tsc -p . && cp -r protos build/", | ||
"compile-protos": "compileProtos src", | ||
"docs": "jsdoc -c .jsdoc.js", | ||
"predocs-test": "npm run docs", | ||
"docs-test": "linkinator docs", | ||
"fix": "gts fix", | ||
"lint": "gts check", | ||
"prepare": "npm run compile-protos && npm run compile", | ||
"system-test": "c8 mocha build/system-test", | ||
"test": "c8 mocha build/test" | ||
}, | ||
"dependencies": { | ||
"google-gax": "^2.14.0" | ||
}, | ||
"devDependencies": { | ||
"@types/mocha": "^8.2.2", | ||
"@types/node": "^14.17.1", | ||
"@types/sinon": "^10.0.0", | ||
"c8": "^7.7.2", | ||
"gts": "^3.1.0", | ||
"jsdoc": "^3.6.7", | ||
"jsdoc-fresh": "^1.0.2", | ||
"jsdoc-region-tag": "^1.0.6", | ||
"linkinator": "^2.13.6", | ||
"mocha": "^8.4.0", | ||
"null-loader": "^4.0.1", | ||
"pack-n-play": "^1.0.0-2", | ||
"sinon": "^10.0.0", | ||
"ts-loader": "^9.2.2", | ||
"typescript": "^4.2.4", | ||
"webpack": "^5.37.1", | ||
"webpack-cli": "^4.7.0" | ||
}, | ||
"engines": { | ||
"node": ">=v10.24.0" | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
owl-bot-staging/v1/protos/google/cloud/websecurityscanner/v1/crawled_url.proto
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
// Copyright 2020 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
syntax = "proto3"; | ||
|
||
package google.cloud.websecurityscanner.v1; | ||
|
||
option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1"; | ||
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner"; | ||
option java_multiple_files = true; | ||
option java_outer_classname = "CrawledUrlProto"; | ||
option java_package = "com.google.cloud.websecurityscanner.v1"; | ||
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1"; | ||
option ruby_package = "Google::Cloud::WebSecurityScanner::V1"; | ||
|
||
// A CrawledUrl resource represents a URL that was crawled during a ScanRun. Web | ||
// Security Scanner Service crawls the web applications, following all links | ||
// within the scope of sites, to find the URLs to test against. | ||
message CrawledUrl { | ||
// Output only. The http method of the request that was used to visit the URL, in | ||
// uppercase. | ||
string http_method = 1; | ||
|
||
// Output only. The URL that was crawled. | ||
string url = 2; | ||
|
||
// Output only. The body of the request that was used to visit the URL. | ||
string body = 3; | ||
} |
119 changes: 119 additions & 0 deletions
119
owl-bot-staging/v1/protos/google/cloud/websecurityscanner/v1/finding.proto
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
// Copyright 2020 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
syntax = "proto3"; | ||
|
||
package google.cloud.websecurityscanner.v1; | ||
|
||
import "google/api/field_behavior.proto"; | ||
import "google/api/resource.proto"; | ||
import "google/cloud/websecurityscanner/v1/finding_addon.proto"; | ||
|
||
option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1"; | ||
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner"; | ||
option java_multiple_files = true; | ||
option java_outer_classname = "FindingProto"; | ||
option java_package = "com.google.cloud.websecurityscanner.v1"; | ||
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1"; | ||
option ruby_package = "Google::Cloud::WebSecurityScanner::V1"; | ||
|
||
// A Finding resource represents a vulnerability instance identified during a | ||
// ScanRun. | ||
message Finding { | ||
option (google.api.resource) = { | ||
type: "websecurityscanner.googleapis.com/Finding" | ||
pattern: "projects/{project}/scanConfigs/{scan_config}/scanRuns/{scan_run}/findings/{finding}" | ||
}; | ||
|
||
// The severity level of a vulnerability. | ||
enum Severity { | ||
// No severity specified. The default value. | ||
SEVERITY_UNSPECIFIED = 0; | ||
|
||
// Critical severity. | ||
CRITICAL = 1; | ||
|
||
// High severity. | ||
HIGH = 2; | ||
|
||
// Medium severity. | ||
MEDIUM = 3; | ||
|
||
// Low severity. | ||
LOW = 4; | ||
} | ||
|
||
// Output only. The resource name of the Finding. The name follows the format of | ||
// 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'. | ||
// The finding IDs are generated by the system. | ||
string name = 1; | ||
|
||
// Output only. The type of the Finding. | ||
// Detailed and up-to-date information on findings can be found here: | ||
// https://cloud.google.com/security-command-center/docs/how-to-remediate-web-security-scanner-findings | ||
string finding_type = 2; | ||
|
||
// Output only. The severity level of the reported vulnerability. | ||
Severity severity = 17 [(google.api.field_behavior) = OUTPUT_ONLY]; | ||
|
||
// Output only. The http method of the request that triggered the vulnerability, in | ||
// uppercase. | ||
string http_method = 3; | ||
|
||
// Output only. The URL produced by the server-side fuzzer and used in the request that | ||
// triggered the vulnerability. | ||
string fuzzed_url = 4; | ||
|
||
// Output only. The body of the request that triggered the vulnerability. | ||
string body = 5; | ||
|
||
// Output only. The description of the vulnerability. | ||
string description = 6; | ||
|
||
// Output only. The URL containing human-readable payload that user can leverage to | ||
// reproduce the vulnerability. | ||
string reproduction_url = 7; | ||
|
||
// Output only. If the vulnerability was originated from nested IFrame, the immediate | ||
// parent IFrame is reported. | ||
string frame_url = 8; | ||
|
||
// Output only. The URL where the browser lands when the vulnerability is detected. | ||
string final_url = 9; | ||
|
||
// Output only. The tracking ID uniquely identifies a vulnerability instance across | ||
// multiple ScanRuns. | ||
string tracking_id = 10; | ||
|
||
// Output only. An addon containing information reported for a vulnerability with an HTML | ||
// form, if any. | ||
Form form = 16; | ||
|
||
// Output only. An addon containing information about outdated libraries. | ||
OutdatedLibrary outdated_library = 11; | ||
|
||
// Output only. An addon containing detailed information regarding any resource causing the | ||
// vulnerability such as JavaScript sources, image, audio files, etc. | ||
ViolatingResource violating_resource = 12; | ||
|
||
// Output only. An addon containing information about vulnerable or missing HTTP headers. | ||
VulnerableHeaders vulnerable_headers = 15; | ||
|
||
// Output only. An addon containing information about request parameters which were found | ||
// to be vulnerable. | ||
VulnerableParameters vulnerable_parameters = 13; | ||
|
||
// Output only. An addon containing information reported for an XSS, if any. | ||
Xss xss = 14; | ||
} |
147 changes: 147 additions & 0 deletions
147
owl-bot-staging/v1/protos/google/cloud/websecurityscanner/v1/finding_addon.proto
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,147 @@ | ||
// Copyright 2020 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
|
||
syntax = "proto3"; | ||
|
||
package google.cloud.websecurityscanner.v1; | ||
|
||
option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1"; | ||
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner"; | ||
option java_multiple_files = true; | ||
option java_outer_classname = "FindingAddonProto"; | ||
option java_package = "com.google.cloud.websecurityscanner.v1"; | ||
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1"; | ||
option ruby_package = "Google::Cloud::WebSecurityScanner::V1"; | ||
|
||
// ! Information about a vulnerability with an HTML. | ||
message Form { | ||
// ! The URI where to send the form when it's submitted. | ||
string action_uri = 1; | ||
|
||
// ! The names of form fields related to the vulnerability. | ||
repeated string fields = 2; | ||
} | ||
|
||
// Information reported for an outdated library. | ||
message OutdatedLibrary { | ||
// The name of the outdated library. | ||
string library_name = 1; | ||
|
||
// The version number. | ||
string version = 2; | ||
|
||
// URLs to learn more information about the vulnerabilities in the library. | ||
repeated string learn_more_urls = 3; | ||
} | ||
|
||
// Information regarding any resource causing the vulnerability such | ||
// as JavaScript sources, image, audio files, etc. | ||
message ViolatingResource { | ||
// The MIME type of this resource. | ||
string content_type = 1; | ||
|
||
// URL of this violating resource. | ||
string resource_url = 2; | ||
} | ||
|
||
// Information about vulnerable request parameters. | ||
message VulnerableParameters { | ||
// The vulnerable parameter names. | ||
repeated string parameter_names = 1; | ||
} | ||
|
||
// Information about vulnerable or missing HTTP Headers. | ||
message VulnerableHeaders { | ||
// Describes a HTTP Header. | ||
message Header { | ||
// Header name. | ||
string name = 1; | ||
|
||
// Header value. | ||
string value = 2; | ||
} | ||
|
||
// List of vulnerable headers. | ||
repeated Header headers = 1; | ||
|
||
// List of missing headers. | ||
repeated Header missing_headers = 2; | ||
} | ||
|
||
// Information reported for an XSS. | ||
message Xss { | ||
// Types of XSS attack vector. | ||
enum AttackVector { | ||
// Unknown attack vector. | ||
ATTACK_VECTOR_UNSPECIFIED = 0; | ||
|
||
// The attack comes from fuzzing the browser's localStorage. | ||
LOCAL_STORAGE = 1; | ||
|
||
// The attack comes from fuzzing the browser's sessionStorage. | ||
SESSION_STORAGE = 2; | ||
|
||
// The attack comes from fuzzing the window's name property. | ||
WINDOW_NAME = 3; | ||
|
||
// The attack comes from fuzzing the referrer property. | ||
REFERRER = 4; | ||
|
||
// The attack comes from fuzzing an input element. | ||
FORM_INPUT = 5; | ||
|
||
// The attack comes from fuzzing the browser's cookies. | ||
COOKIE = 6; | ||
|
||
// The attack comes from hijacking the post messaging mechanism. | ||
POST_MESSAGE = 7; | ||
|
||
// The attack comes from fuzzing parameters in the url. | ||
GET_PARAMETERS = 8; | ||
|
||
// The attack comes from fuzzing the fragment in the url. | ||
URL_FRAGMENT = 9; | ||
|
||
// The attack comes from fuzzing the HTML comments. | ||
HTML_COMMENT = 10; | ||
|
||
// The attack comes from fuzzing the POST parameters. | ||
POST_PARAMETERS = 11; | ||
|
||
// The attack comes from fuzzing the protocol. | ||
PROTOCOL = 12; | ||
|
||
// The attack comes from the server side and is stored. | ||
STORED_XSS = 13; | ||
|
||
// The attack is a Same-Origin Method Execution attack via a GET parameter. | ||
SAME_ORIGIN = 14; | ||
|
||
// The attack payload is received from a third-party host via a URL that is | ||
// user-controllable | ||
USER_CONTROLLABLE_URL = 15; | ||
} | ||
|
||
// Stack traces leading to the point where the XSS occurred. | ||
repeated string stack_traces = 1; | ||
|
||
// An error message generated by a javascript breakage. | ||
string error_message = 2; | ||
|
||
// The attack vector of the payload triggering this XSS. | ||
AttackVector attack_vector = 3; | ||
|
||
// The reproduction url for the seeding POST request of a Stored XSS. | ||
string stored_xss_seeding_url = 4; | ||
} |
Oops, something went wrong.