Crates.io | google-securitycenter1 |
lib.rs | google-securitycenter1 |
version | 6.0.0+20240622 |
source | src |
created_at | 2019-07-05 06:06:37.020701 |
updated_at | 2024-10-15 20:37:03.285757 |
description | A complete library to interact with Security Command Center (protocol v1) |
homepage | https://cloud.google.com/security-command-center |
repository | https://github.com/Byron/google-apis-rs/tree/main/gen/securitycenter1 |
max_upload_size | |
id | 146433 |
size | 2,897,268 |
The google-securitycenter1
library allows access to all features of the Google Security Command Center service.
This documentation was generated from Security Command Center crate version 6.0.0+20240622, where 20240622 is the exact revision of the securitycenter:v1 schema built by the mako code generator v6.0.0.
Everything else about the Security Command Center v1 API can be found at the official documentation site.
Handle the following Resources with ease from the central hub ...
assets group, assets list, assets update security marks, big query exports create, big query exports delete, big query exports get, big query exports list, big query exports patch, event threat detection settings custom modules create, event threat detection settings custom modules delete, event threat detection settings custom modules get, event threat detection settings custom modules list, event threat detection settings custom modules list descendant, event threat detection settings custom modules patch, event threat detection settings effective custom modules get, event threat detection settings effective custom modules list, event threat detection settings validate custom module, findings bulk mute, locations mute configs create, locations mute configs delete, locations mute configs get, locations mute configs list, locations mute configs patch, mute configs create, mute configs delete, mute configs get, mute configs list, mute configs patch, notification configs create, notification configs delete, notification configs get, notification configs list, notification configs patch, security health analytics settings custom modules create, security health analytics settings custom modules delete, security health analytics settings custom modules get, security health analytics settings custom modules list, security health analytics settings custom modules list descendant, security health analytics settings custom modules patch, security health analytics settings custom modules simulate, security health analytics settings effective custom modules get, security health analytics settings effective custom modules list, sources findings external systems patch, sources findings group, sources findings list, sources findings patch, sources findings set mute, sources findings set state, sources findings update security marks and sources list
organizations
assets group, assets list, assets run discovery, assets update security marks, big query exports create, big query exports delete, big query exports get, big query exports list, big query exports patch, event threat detection settings custom modules create, event threat detection settings custom modules delete, event threat detection settings custom modules get, event threat detection settings custom modules list, event threat detection settings custom modules list descendant, event threat detection settings custom modules patch, event threat detection settings effective custom modules get, event threat detection settings effective custom modules list, event threat detection settings validate custom module, findings bulk mute, get organization settings, locations mute configs create, locations mute configs delete, locations mute configs get, locations mute configs list, locations mute configs patch, mute configs create, mute configs delete, mute configs get, mute configs list, mute configs patch, notification configs create, notification configs delete, notification configs get, notification configs list, notification configs patch, operations cancel, operations delete, operations get, operations list, resource value configs batch create, resource value configs delete, resource value configs get, resource value configs list, resource value configs patch, security health analytics settings custom modules create, security health analytics settings custom modules delete, security health analytics settings custom modules get, security health analytics settings custom modules list, security health analytics settings custom modules list descendant, security health analytics settings custom modules patch, security health analytics settings custom modules simulate, security health analytics settings effective custom modules get, security health analytics settings effective custom modules list, simulations attack exposure results attack paths list, simulations attack exposure results valued resources list, simulations attack paths list, simulations get, simulations valued resources attack paths list, simulations valued resources get, simulations valued resources list, sources create, sources findings create, sources findings external systems patch, sources findings group, sources findings list, sources findings patch, sources findings set mute, sources findings set state, sources findings update security marks, sources get, sources get iam policy, sources list, sources patch, sources set iam policy, sources test iam permissions and update organization settings
projects
assets group, assets list, assets update security marks, big query exports create, big query exports delete, big query exports get, big query exports list, big query exports patch, event threat detection settings custom modules create, event threat detection settings custom modules delete, event threat detection settings custom modules get, event threat detection settings custom modules list, event threat detection settings custom modules list descendant, event threat detection settings custom modules patch, event threat detection settings effective custom modules get, event threat detection settings effective custom modules list, event threat detection settings validate custom module, findings bulk mute, locations mute configs create, locations mute configs delete, locations mute configs get, locations mute configs list, locations mute configs patch, mute configs create, mute configs delete, mute configs get, mute configs list, mute configs patch, notification configs create, notification configs delete, notification configs get, notification configs list, notification configs patch, security health analytics settings custom modules create, security health analytics settings custom modules delete, security health analytics settings custom modules get, security health analytics settings custom modules list, security health analytics settings custom modules list descendant, security health analytics settings custom modules patch, security health analytics settings custom modules simulate, security health analytics settings effective custom modules get, security health analytics settings effective custom modules list, sources findings external systems patch, sources findings group, sources findings list, sources findings patch, sources findings set mute, sources findings set state, sources findings update security marks and sources list
The API is structured into the following primary items:
All structures are marked with applicable traits to further categorize them and ease browsing.
Generally speaking, you can invoke Activities like this:
let r = hub.resource().activity(...).doit().await
Or specifically ...
let r = hub.folders().assets_group(...).doit().await
let r = hub.folders().assets_list(...).doit().await
let r = hub.folders().assets_update_security_marks(...).doit().await
let r = hub.folders().big_query_exports_create(...).doit().await
let r = hub.folders().big_query_exports_delete(...).doit().await
let r = hub.folders().big_query_exports_get(...).doit().await
let r = hub.folders().big_query_exports_list(...).doit().await
let r = hub.folders().big_query_exports_patch(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_create(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_delete(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_get(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_list(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_list_descendant(...).doit().await
let r = hub.folders().event_threat_detection_settings_custom_modules_patch(...).doit().await
let r = hub.folders().event_threat_detection_settings_effective_custom_modules_get(...).doit().await
let r = hub.folders().event_threat_detection_settings_effective_custom_modules_list(...).doit().await
let r = hub.folders().event_threat_detection_settings_validate_custom_module(...).doit().await
let r = hub.folders().findings_bulk_mute(...).doit().await
let r = hub.folders().locations_mute_configs_create(...).doit().await
let r = hub.folders().locations_mute_configs_delete(...).doit().await
let r = hub.folders().locations_mute_configs_get(...).doit().await
let r = hub.folders().locations_mute_configs_list(...).doit().await
let r = hub.folders().locations_mute_configs_patch(...).doit().await
let r = hub.folders().mute_configs_create(...).doit().await
let r = hub.folders().mute_configs_delete(...).doit().await
let r = hub.folders().mute_configs_get(...).doit().await
let r = hub.folders().mute_configs_list(...).doit().await
let r = hub.folders().mute_configs_patch(...).doit().await
let r = hub.folders().notification_configs_create(...).doit().await
let r = hub.folders().notification_configs_delete(...).doit().await
let r = hub.folders().notification_configs_get(...).doit().await
let r = hub.folders().notification_configs_list(...).doit().await
let r = hub.folders().notification_configs_patch(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_create(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_delete(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_get(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_list(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_list_descendant(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_patch(...).doit().await
let r = hub.folders().security_health_analytics_settings_custom_modules_simulate(...).doit().await
let r = hub.folders().security_health_analytics_settings_effective_custom_modules_get(...).doit().await
let r = hub.folders().security_health_analytics_settings_effective_custom_modules_list(...).doit().await
let r = hub.folders().sources_findings_external_systems_patch(...).doit().await
let r = hub.folders().sources_findings_group(...).doit().await
let r = hub.folders().sources_findings_list(...).doit().await
let r = hub.folders().sources_findings_patch(...).doit().await
let r = hub.folders().sources_findings_set_mute(...).doit().await
let r = hub.folders().sources_findings_set_state(...).doit().await
let r = hub.folders().sources_findings_update_security_marks(...).doit().await
let r = hub.folders().sources_list(...).doit().await
The resource()
and activity(...)
calls create builders. The second one dealing with Activities
supports various methods to configure the impending operation (not shown here). It is made such that all required arguments have to be
specified right away (i.e. (...)
), whereas all optional ones can be build up as desired.
The doit()
method performs the actual communication with the server and returns the respective result.
To use this library, you would put the following lines into your Cargo.toml
file:
[dependencies]
google-securitycenter1 = "*"
serde = "1"
serde_json = "1"
extern crate hyper;
extern crate hyper_rustls;
extern crate google_securitycenter1 as securitycenter1;
use securitycenter1::{Result, Error};
use securitycenter1::{SecurityCommandCenter, FieldMask, hyper_rustls, hyper_util, yup_oauth2};
// Get an ApplicationSecret instance by some means. It contains the `client_id` and
// `client_secret`, among other things.
let secret: yup_oauth2::ApplicationSecret = Default::default();
// Instantiate the authenticator. It will choose a suitable authentication flow for you,
// unless you replace `None` with the desired Flow.
// Provide your own `AuthenticatorDelegate` to adjust the way it operates and get feedback about
// what's going on. You probably want to bring in your own `TokenStorage` to persist tokens and
// retrieve them from storage.
let auth = yup_oauth2::InstalledFlowAuthenticator::builder(
secret,
yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
).build().await.unwrap();
let client = hyper_util::client::legacy::Client::builder(
hyper_util::rt::TokioExecutor::new()
)
.build(
hyper_rustls::HttpsConnectorBuilder::new()
.with_native_roots()
.unwrap()
.https_or_http()
.enable_http1()
.build()
);
let mut hub = SecurityCommandCenter::new(client, auth);
// You can configure optional parameters by calling the respective setters at will, and
// execute the final call using `doit()`.
// Values shown here are possibly random and not representative !
let result = hub.folders().assets_list("parent")
.read_time(chrono::Utc::now())
.page_token("magna")
.page_size(-11)
.order_by("ipsum")
.filter("voluptua.")
.field_mask(FieldMask::new::<&str>(&[]))
.compare_duration(chrono::Duration::seconds(9827880))
.doit().await;
match result {
Err(e) => match e {
// The Error enum provides details about what exactly happened.
// You can also just use its `Debug`, `Display` or `Error` traits
Error::HttpError(_)
|Error::Io(_)
|Error::MissingAPIKey
|Error::MissingToken(_)
|Error::Cancelled
|Error::UploadSizeLimitExceeded(_, _)
|Error::Failure(_)
|Error::BadRequest(_)
|Error::FieldClash(_)
|Error::JsonDecodeError(_, _) => println!("{}", e),
},
Ok(res) => println!("Success: {:?}", res),
}
All errors produced by the system are provided either as Result enumeration as return value of the doit() methods, or handed as possibly intermediate results to either the Hub Delegate, or the Authenticator Delegate.
When delegates handle errors or intermediate values, they may have a chance to instruct the system to retry. This makes the system potentially resilient to all kinds of errors.
If a method supports downloads, the response body, which is part of the Result, should be
read by you to obtain the media.
If such a method also supports a Response Result, it will return that by default.
You can see it as meta-data for the actual media. To trigger a media download, you will have to set up the builder by making
this call: .param("alt", "media")
.
Methods supporting uploads can do so using up to 2 different protocols:
simple and resumable. The distinctiveness of each is represented by customized
doit(...)
methods, which are then named upload(...)
and upload_resumable(...)
respectively.
You may alter the way an doit()
method is called by providing a delegate to the
Method Builder before making the final doit()
call.
Respective methods will be called to provide progress information, as well as determine whether the system should
retry on failure.
The delegate trait is default-implemented, allowing you to customize it with minimal effort.
All structures provided by this library are made to be encodable and decodable via json. Optionals are used to indicate that partial requests are responses are valid. Most optionals are are considered Parts which are identifiable by name, which will be sent to the server to indicate either the set parts of the request or the desired parts in the response.
Using method builders, you are able to prepare an action call by repeatedly calling it's methods. These will always take a single argument, for which the following statements are true.
&str
Arguments will always be copied or cloned into the builder, to make them independent of their original life times.
utoipa
- Add support for utoipa and derive utoipa::ToSchema
on all
the types. You'll have to import and register the required types in #[openapi(schemas(...))]
, otherwise the
generated openapi
spec would be invalid.
The securitycenter1 library was generated by Sebastian Thiel, and is placed under the MIT license. You can read the full text at the repository's license file.