Skip to content

Commit 07d2f43

Browse files
feat(containeranalysis): update the api
#### containeranalysis:v1beta1 The following keys were added: - schemas.PackageIssue.properties.effectiveSeverity (Total Keys: 2) - schemas.PackageIssue.properties.packageType.type (Total Keys: 1)
1 parent 90b095a commit 07d2f43

8 files changed

+74
-31
lines changed

docs/dyn/containeranalysis_v1alpha1.projects.notes.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1alpha1.projects.occurrences.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1alpha1.providers.notes.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1beta1.projects.notes.html

Lines changed: 3 additions & 3 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1beta1.projects.notes.occurrences.html

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,7 @@ <h3>Method Details</h3>
417417
&quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this occurrence was last updated.
418418
&quot;vulnerability&quot;: { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
419419
&quot;cvssScore&quot;: 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a scale of 0-10 where 0 indicates low severity and 10 indicates high severity.
420-
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # The distro assigned severity for this vulnerability when it is available, and note provider assigned severity when distro has not yet assigned a severity for this vulnerability.
420+
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # The distro assigned severity for this vulnerability when it is available, and note provider assigned severity when distro has not yet assigned a severity for this vulnerability. When there are multiple PackageIssues for this vulnerability, they can have different effective severities because some might be provided by the distro while others are provided by the language ecosystem for a language pack. For this reason, it is advised to use the effective severity on the PackageIssue level. In the case where multiple PackageIssues have differing effective severities, this field should be the highest severity for any of the PackageIssues.
421421
&quot;longDescription&quot;: &quot;A String&quot;, # Output only. A detailed description of this vulnerability.
422422
&quot;packageIssue&quot;: [ # Required. The set of affected locations and their fixes (if available) within the associated resource.
423423
{ # This message wraps a location affected by a vulnerability and its associated fix (if one is available).
@@ -432,6 +432,7 @@ <h3>Method Details</h3>
432432
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
433433
},
434434
},
435+
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # Output only. The distro or language system assigned severity for this vulnerability when that is available and note provider assigned severity when it is not available.
435436
&quot;fixedLocation&quot;: { # The location of the vulnerability. # The location of the available fix for vulnerability.
436437
&quot;cpeUri&quot;: &quot;A String&quot;, # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar.
437438
&quot;package&quot;: &quot;A String&quot;, # Required. The package being described.
@@ -443,6 +444,7 @@ <h3>Method Details</h3>
443444
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
444445
},
445446
},
447+
&quot;packageType&quot;: &quot;A String&quot;, # The type of package (e.g. OS, MAVEN, GO).
446448
&quot;severityName&quot;: &quot;A String&quot;, # Deprecated, use Details.effective_severity instead The severity (e.g., distro assigned severity) for this vulnerability.
447449
},
448450
],

docs/dyn/containeranalysis_v1beta1.projects.occurrences.html

Lines changed: 27 additions & 11 deletions
Large diffs are not rendered by default.

googleapiclient/discovery_cache/documents/containeranalysis.v1alpha1.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"oauth2": {
44
"scopes": {
55
"https://www.googleapis.com/auth/cloud-platform": {
6-
"description": "See, edit, configure, and delete your Google Cloud Platform data"
6+
"description": "See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account."
77
}
88
}
99
}
@@ -1229,7 +1229,7 @@
12291229
}
12301230
}
12311231
},
1232-
"revision": "20210806",
1232+
"revision": "20210813",
12331233
"rootUrl": "https://containeranalysis.googleapis.com/",
12341234
"schemas": {
12351235
"Artifact": {
@@ -3233,7 +3233,7 @@
32333233
"type": "object"
32343234
},
32353235
"Policy": {
3236-
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members` to a single `role`. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).",
3236+
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members` to a single `role`. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).",
32373237
"id": "Policy",
32383238
"properties": {
32393239
"bindings": {

googleapiclient/discovery_cache/documents/containeranalysis.v1beta1.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"oauth2": {
44
"scopes": {
55
"https://www.googleapis.com/auth/cloud-platform": {
6-
"description": "See, edit, configure, and delete your Google Cloud Platform data"
6+
"description": "See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account."
77
}
88
}
99
}
@@ -853,7 +853,7 @@
853853
}
854854
}
855855
},
856-
"revision": "20210806",
856+
"revision": "20210813",
857857
"rootUrl": "https://containeranalysis.googleapis.com/",
858858
"schemas": {
859859
"AliasContext": {
@@ -2207,7 +2207,7 @@
22072207
"type": "number"
22082208
},
22092209
"effectiveSeverity": {
2210-
"description": "The distro assigned severity for this vulnerability when it is available, and note provider assigned severity when distro has not yet assigned a severity for this vulnerability.",
2210+
"description": "The distro assigned severity for this vulnerability when it is available, and note provider assigned severity when distro has not yet assigned a severity for this vulnerability. When there are multiple PackageIssues for this vulnerability, they can have different effective severities because some might be provided by the distro while others are provided by the language ecosystem for a language pack. For this reason, it is advised to use the effective severity on the PackageIssue level. In the case where multiple PackageIssues have differing effective severities, this field should be the highest severity for any of the PackageIssues.",
22112211
"enum": [
22122212
"SEVERITY_UNSPECIFIED",
22132213
"MINIMAL",
@@ -2834,10 +2834,35 @@
28342834
"$ref": "VulnerabilityLocation",
28352835
"description": "Required. The location of the vulnerability."
28362836
},
2837+
"effectiveSeverity": {
2838+
"description": "Output only. The distro or language system assigned severity for this vulnerability when that is available and note provider assigned severity when it is not available.",
2839+
"enum": [
2840+
"SEVERITY_UNSPECIFIED",
2841+
"MINIMAL",
2842+
"LOW",
2843+
"MEDIUM",
2844+
"HIGH",
2845+
"CRITICAL"
2846+
],
2847+
"enumDescriptions": [
2848+
"Unknown.",
2849+
"Minimal severity.",
2850+
"Low severity.",
2851+
"Medium severity.",
2852+
"High severity.",
2853+
"Critical severity."
2854+
],
2855+
"readOnly": true,
2856+
"type": "string"
2857+
},
28372858
"fixedLocation": {
28382859
"$ref": "VulnerabilityLocation",
28392860
"description": "The location of the available fix for vulnerability."
28402861
},
2862+
"packageType": {
2863+
"description": "The type of package (e.g. OS, MAVEN, GO).",
2864+
"type": "string"
2865+
},
28412866
"severityName": {
28422867
"description": "Deprecated, use Details.effective_severity instead The severity (e.g., distro assigned severity) for this vulnerability.",
28432868
"type": "string"
@@ -2981,7 +3006,7 @@
29813006
"type": "object"
29823007
},
29833008
"Policy": {
2984-
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members` to a single `role`. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).",
3009+
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members` to a single `role`. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).",
29853010
"id": "Policy",
29863011
"properties": {
29873012
"bindings": {

0 commit comments

Comments
 (0)