1// Copyright 2020 Google LLC 2// 3// Licensed under the Apache License, Version 2.0 (the "License"); 4// you may not use this file except in compliance with the License. 5// You may obtain a copy of the License at 6// 7// http://www.apache.org/licenses/LICENSE-2.0 8// 9// Unless required by applicable law or agreed to in writing, software 10// distributed under the License is distributed on an "AS IS" BASIS, 11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12// See the License for the specific language governing permissions and 13// limitations under the License. 14 15syntax = "proto3"; 16 17package google.cloud.securitycenter.v1beta1; 18 19import "google/api/resource.proto"; 20 21option go_package = "cloud.google.com/go/securitycenter/apiv1beta1/securitycenterpb;securitycenterpb"; 22option java_multiple_files = true; 23option java_package = "com.google.cloud.securitycenter.v1beta1"; 24 25// Security Command Center finding source. A finding source 26// is an entity or a mechanism that can produce a finding. A source is like a 27// container of findings that come from the same scanner, logger, monitor, etc. 28message Source { 29 option (google.api.resource) = { 30 type: "securitycenter.googleapis.com/Source" 31 pattern: "organizations/{organization}/sources/{source}" 32 }; 33 34 // The relative resource name of this source. See: 35 // https://cloud.google.com/apis/design/resource_names#relative_resource_name 36 // Example: 37 // "organizations/{organization_id}/sources/{source_id}" 38 string name = 1; 39 40 // The source's display name. 41 // A source's display name must be unique amongst its siblings, for example, 42 // two sources with the same parent can't share the same display name. 43 // The display name must have a length between 1 and 64 characters 44 // (inclusive). 45 string display_name = 2; 46 47 // The description of the source (max of 1024 characters). 48 // Example: 49 // "Web Security Scanner is a web security scanner for common 50 // vulnerabilities in App Engine applications. It can automatically 51 // scan and detect four common vulnerabilities, including cross-site-scripting 52 // (XSS), Flash injection, mixed content (HTTP in HTTPS), and 53 // outdated/insecure libraries." 54 string description = 3; 55} 56