Skip to content
This repository has been archived by the owner on Jul 20, 2023. It is now read-only.

Commit

Permalink
fix: GoogleAdsError missing using generator version after 1.3.0
Browse files Browse the repository at this point in the history
[PR](googleapis/gapic-generator-typescript#878) within
updated gapic-generator-typescript version 1.4.0

Committer: @summer-ji-eng
PiperOrigin-RevId: 375759421

Source-Link: googleapis/googleapis@95fa72f

Source-Link: https://github.com/googleapis/googleapis-gen/commit/f40a34377ad488a7c2bc3992b3c8d5faf5a15c46
  • Loading branch information
gcf-owl-bot[bot] committed May 25, 2021
1 parent 05f7b59 commit 6bfc7e3
Show file tree
Hide file tree
Showing 72 changed files with 16,854 additions and 0 deletions.
1 change: 1 addition & 0 deletions owl-bot-staging/v1/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Websecurityscanner: Nodejs Client
10 changes: 10 additions & 0 deletions owl-bot-staging/v1/linkinator.config.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"recurse": true,
"skip": [
"https://codecov.io/gh/googleapis/",
"www.googleapis.com",
"img.shields.io"
],
"silent": true,
"concurrency": 10
}
64 changes: 64 additions & 0 deletions owl-bot-staging/v1/package.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
{
"name": "@google-cloud/web-security-scanner",
"version": "0.1.0",
"description": "Websecurityscanner client for Node.js",
"repository": "googleapis/nodejs-websecurityscanner",
"license": "Apache-2.0",
"author": "Google LLC",
"main": "build/src/index.js",
"files": [
"build/src",
"build/protos"
],
"keywords": [
"google apis client",
"google api client",
"google apis",
"google api",
"google",
"google cloud platform",
"google cloud",
"cloud",
"google websecurityscanner",
"websecurityscanner",
"web security scanner"
],
"scripts": {
"clean": "gts clean",
"compile": "tsc -p . && cp -r protos build/",
"compile-protos": "compileProtos src",
"docs": "jsdoc -c .jsdoc.js",
"predocs-test": "npm run docs",
"docs-test": "linkinator docs",
"fix": "gts fix",
"lint": "gts check",
"prepare": "npm run compile-protos && npm run compile",
"system-test": "c8 mocha build/system-test",
"test": "c8 mocha build/test"
},
"dependencies": {
"google-gax": "^2.14.0"
},
"devDependencies": {
"@types/mocha": "^8.2.2",
"@types/node": "^14.17.1",
"@types/sinon": "^10.0.0",
"c8": "^7.7.2",
"gts": "^3.1.0",
"jsdoc": "^3.6.7",
"jsdoc-fresh": "^1.0.2",
"jsdoc-region-tag": "^1.0.6",
"linkinator": "^2.13.6",
"mocha": "^8.4.0",
"null-loader": "^4.0.1",
"pack-n-play": "^1.0.0-2",
"sinon": "^10.0.0",
"ts-loader": "^9.2.2",
"typescript": "^4.2.4",
"webpack": "^5.37.1",
"webpack-cli": "^4.7.0"
},
"engines": {
"node": ">=v10.24.0"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

syntax = "proto3";

package google.cloud.websecurityscanner.v1;

option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1";
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner";
option java_multiple_files = true;
option java_outer_classname = "CrawledUrlProto";
option java_package = "com.google.cloud.websecurityscanner.v1";
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1";
option ruby_package = "Google::Cloud::WebSecurityScanner::V1";

// A CrawledUrl resource represents a URL that was crawled during a ScanRun. Web
// Security Scanner Service crawls the web applications, following all links
// within the scope of sites, to find the URLs to test against.
message CrawledUrl {
// Output only. The http method of the request that was used to visit the URL, in
// uppercase.
string http_method = 1;

// Output only. The URL that was crawled.
string url = 2;

// Output only. The body of the request that was used to visit the URL.
string body = 3;
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,119 @@
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

syntax = "proto3";

package google.cloud.websecurityscanner.v1;

import "google/api/field_behavior.proto";
import "google/api/resource.proto";
import "google/cloud/websecurityscanner/v1/finding_addon.proto";

option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1";
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner";
option java_multiple_files = true;
option java_outer_classname = "FindingProto";
option java_package = "com.google.cloud.websecurityscanner.v1";
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1";
option ruby_package = "Google::Cloud::WebSecurityScanner::V1";

// A Finding resource represents a vulnerability instance identified during a
// ScanRun.
message Finding {
option (google.api.resource) = {
type: "websecurityscanner.googleapis.com/Finding"
pattern: "projects/{project}/scanConfigs/{scan_config}/scanRuns/{scan_run}/findings/{finding}"
};

// The severity level of a vulnerability.
enum Severity {
// No severity specified. The default value.
SEVERITY_UNSPECIFIED = 0;

// Critical severity.
CRITICAL = 1;

// High severity.
HIGH = 2;

// Medium severity.
MEDIUM = 3;

// Low severity.
LOW = 4;
}

// Output only. The resource name of the Finding. The name follows the format of
// 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
// The finding IDs are generated by the system.
string name = 1;

// Output only. The type of the Finding.
// Detailed and up-to-date information on findings can be found here:
// https://cloud.google.com/security-command-center/docs/how-to-remediate-web-security-scanner-findings
string finding_type = 2;

// Output only. The severity level of the reported vulnerability.
Severity severity = 17 [(google.api.field_behavior) = OUTPUT_ONLY];

// Output only. The http method of the request that triggered the vulnerability, in
// uppercase.
string http_method = 3;

// Output only. The URL produced by the server-side fuzzer and used in the request that
// triggered the vulnerability.
string fuzzed_url = 4;

// Output only. The body of the request that triggered the vulnerability.
string body = 5;

// Output only. The description of the vulnerability.
string description = 6;

// Output only. The URL containing human-readable payload that user can leverage to
// reproduce the vulnerability.
string reproduction_url = 7;

// Output only. If the vulnerability was originated from nested IFrame, the immediate
// parent IFrame is reported.
string frame_url = 8;

// Output only. The URL where the browser lands when the vulnerability is detected.
string final_url = 9;

// Output only. The tracking ID uniquely identifies a vulnerability instance across
// multiple ScanRuns.
string tracking_id = 10;

// Output only. An addon containing information reported for a vulnerability with an HTML
// form, if any.
Form form = 16;

// Output only. An addon containing information about outdated libraries.
OutdatedLibrary outdated_library = 11;

// Output only. An addon containing detailed information regarding any resource causing the
// vulnerability such as JavaScript sources, image, audio files, etc.
ViolatingResource violating_resource = 12;

// Output only. An addon containing information about vulnerable or missing HTTP headers.
VulnerableHeaders vulnerable_headers = 15;

// Output only. An addon containing information about request parameters which were found
// to be vulnerable.
VulnerableParameters vulnerable_parameters = 13;

// Output only. An addon containing information reported for an XSS, if any.
Xss xss = 14;
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,147 @@
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

syntax = "proto3";

package google.cloud.websecurityscanner.v1;

option csharp_namespace = "Google.Cloud.WebSecurityScanner.V1";
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1;websecurityscanner";
option java_multiple_files = true;
option java_outer_classname = "FindingAddonProto";
option java_package = "com.google.cloud.websecurityscanner.v1";
option php_namespace = "Google\\Cloud\\WebSecurityScanner\\V1";
option ruby_package = "Google::Cloud::WebSecurityScanner::V1";

// ! Information about a vulnerability with an HTML.
message Form {
// ! The URI where to send the form when it's submitted.
string action_uri = 1;

// ! The names of form fields related to the vulnerability.
repeated string fields = 2;
}

// Information reported for an outdated library.
message OutdatedLibrary {
// The name of the outdated library.
string library_name = 1;

// The version number.
string version = 2;

// URLs to learn more information about the vulnerabilities in the library.
repeated string learn_more_urls = 3;
}

// Information regarding any resource causing the vulnerability such
// as JavaScript sources, image, audio files, etc.
message ViolatingResource {
// The MIME type of this resource.
string content_type = 1;

// URL of this violating resource.
string resource_url = 2;
}

// Information about vulnerable request parameters.
message VulnerableParameters {
// The vulnerable parameter names.
repeated string parameter_names = 1;
}

// Information about vulnerable or missing HTTP Headers.
message VulnerableHeaders {
// Describes a HTTP Header.
message Header {
// Header name.
string name = 1;

// Header value.
string value = 2;
}

// List of vulnerable headers.
repeated Header headers = 1;

// List of missing headers.
repeated Header missing_headers = 2;
}

// Information reported for an XSS.
message Xss {
// Types of XSS attack vector.
enum AttackVector {
// Unknown attack vector.
ATTACK_VECTOR_UNSPECIFIED = 0;

// The attack comes from fuzzing the browser's localStorage.
LOCAL_STORAGE = 1;

// The attack comes from fuzzing the browser's sessionStorage.
SESSION_STORAGE = 2;

// The attack comes from fuzzing the window's name property.
WINDOW_NAME = 3;

// The attack comes from fuzzing the referrer property.
REFERRER = 4;

// The attack comes from fuzzing an input element.
FORM_INPUT = 5;

// The attack comes from fuzzing the browser's cookies.
COOKIE = 6;

// The attack comes from hijacking the post messaging mechanism.
POST_MESSAGE = 7;

// The attack comes from fuzzing parameters in the url.
GET_PARAMETERS = 8;

// The attack comes from fuzzing the fragment in the url.
URL_FRAGMENT = 9;

// The attack comes from fuzzing the HTML comments.
HTML_COMMENT = 10;

// The attack comes from fuzzing the POST parameters.
POST_PARAMETERS = 11;

// The attack comes from fuzzing the protocol.
PROTOCOL = 12;

// The attack comes from the server side and is stored.
STORED_XSS = 13;

// The attack is a Same-Origin Method Execution attack via a GET parameter.
SAME_ORIGIN = 14;

// The attack payload is received from a third-party host via a URL that is
// user-controllable
USER_CONTROLLABLE_URL = 15;
}

// Stack traces leading to the point where the XSS occurred.
repeated string stack_traces = 1;

// An error message generated by a javascript breakage.
string error_message = 2;

// The attack vector of the payload triggering this XSS.
AttackVector attack_vector = 3;

// The reproduction url for the seeding POST request of a Stored XSS.
string stored_xss_seeding_url = 4;
}
Loading

0 comments on commit 6bfc7e3

Please sign in to comment.