Skip to content

Commit 0ac65b3

Browse files
committed
google_scc: fix field name typo
1 parent 368710b commit 0ac65b3

File tree

6 files changed

+12
-7
lines changed

6 files changed

+12
-7
lines changed

packages/google_scc/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.4.1"
3+
changes:
4+
- description: Fix field name typo.
5+
type: bugfix
6+
link: https://github.com/elastic/integrations/pull/11053
27
- version: "1.4.0"
38
changes:
49
- description: Removed import_mappings. Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template.

packages/google_scc/data_stream/asset/_dev/test/pipeline/test-asset.log-expected.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -371,7 +371,7 @@
371371
"log_type": "DATA_READ"
372372
},
373373
{
374-
"exemted_members": [
374+
"exempted_members": [
375375
"user:aliya@example.com"
376376
],
377377
"log_type": "DATA_WRITE"

packages/google_scc/data_stream/asset/elasticsearch/ingest_pipeline/pipeline_asset.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ processors:
208208
"auditConfigs": "audit_configs"
209209
"auditLogConfigs": "audit_log_configs"
210210
"logType": "log_type"
211-
"exemptedMembers": "exemted_members"
211+
"exemptedMembers": "exempted_members"
212212
tag: painless_to_rename_fields_under_iamPolicy_auditConfigs_object
213213
source: |
214214
def renameKeys(Map json, Map keyMap) {

packages/google_scc/data_stream/asset/fields/fields.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@
118118
- name: audit_log_configs
119119
type: group
120120
fields:
121-
- name: exemted_members
121+
- name: exempted_members
122122
type: keyword
123123
description: Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
124124
- name: log_type
@@ -384,7 +384,7 @@
384384
- name: audit_log_configs
385385
type: group
386386
fields:
387-
- name: exemted_members
387+
- name: exempted_members
388388
type: keyword
389389
description: Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
390390
- name: log_type

packages/google_scc/docs/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ An example event for `asset` looks as following:
262262
| google_scc.asset.access_policy.scopes | The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=["folders/123"] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes "folders/123" will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of folders/\{folder_number\} or projects/\{project_number\}. | keyword |
263263
| google_scc.asset.access_policy.title | Required. Human readable title. Does not affect behavior. | keyword |
264264
| google_scc.asset.ancestors | The ancestry path of an asset in Google Cloud resource hierarchy, represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: ["projects/123456789", "folders/5432", "organizations/1234"]. | keyword |
265-
| google_scc.asset.iam_policy.audit_configs.audit_log_configs.exemted_members | Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. | keyword |
265+
| google_scc.asset.iam_policy.audit_configs.audit_log_configs.exempted_members | Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. | keyword |
266266
| google_scc.asset.iam_policy.audit_configs.audit_log_configs.log_type | The log type that this config enables. | keyword |
267267
| google_scc.asset.iam_policy.audit_configs.service | Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services. | keyword |
268268
| google_scc.asset.iam_policy.bindings.condition | The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation. | flattened |
@@ -324,7 +324,7 @@ An example event for `asset` looks as following:
324324
| google_scc.asset.prior.access_policy.scopes | The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=["folders/123"] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes "folders/123" will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of folders/\{folder_number\} or projects/\{project_number\}. | keyword |
325325
| google_scc.asset.prior.access_policy.title | Required. Human readable title. Does not affect behavior. | keyword |
326326
| google_scc.asset.prior.ancestors | The ancestry path of an asset in Google Cloud resource hierarchy, represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: ["projects/123456789", "folders/5432", "organizations/1234"]. | keyword |
327-
| google_scc.asset.prior.iam_policy.audit_configs.audit_log_configs.exemted_members | Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. | keyword |
327+
| google_scc.asset.prior.iam_policy.audit_configs.audit_log_configs.exempted_members | Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. | keyword |
328328
| google_scc.asset.prior.iam_policy.audit_configs.audit_log_configs.log_type | The log type that this config enables. | keyword |
329329
| google_scc.asset.prior.iam_policy.audit_configs.service | Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services. | keyword |
330330
| google_scc.asset.prior.iam_policy.bindings.condition | The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation. | flattened |

packages/google_scc/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: "3.0.3"
22
name: google_scc
33
title: Google Security Command Center
4-
version: "1.4.0"
4+
version: "1.4.1"
55
description: Collect logs from Google Security Command Center with Elastic Agent.
66
type: integration
77
categories:

0 commit comments

Comments
 (0)