Skip to content

Commit 911b255

Browse files
feat(containeranalysis): update the api
#### containeranalysis:v1 The following keys were added: - schemas.VulnerabilityNote.properties.cvssV2.$ref (Total Keys: 1) - schemas.VulnerabilityOccurrence.properties.cvssV2.$ref (Total Keys: 1) #### containeranalysis:v1alpha1 The following keys were added: - schemas.Assessment (Total Keys: 10) - schemas.IdentifierHelper (Total Keys: 4) - schemas.Note.properties.vulnerabilityAssessment.$ref (Total Keys: 1) - schemas.Product (Total Keys: 5) - schemas.Publisher (Total Keys: 5) - schemas.Remediation (Total Keys: 7) - schemas.Threat (Total Keys: 4) - schemas.URI (Total Keys: 4) - schemas.VexAssessment (Total Keys: 11) - schemas.VulnerabilityAssessmentNote (Total Keys: 6) - schemas.VulnerabilityDetails.properties.cvssV2.$ref (Total Keys: 1) - schemas.VulnerabilityDetails.properties.cvssVersion (Total Keys: 2) - schemas.VulnerabilityDetails.properties.vexAssessment.$ref (Total Keys: 1) - schemas.VulnerabilityType.properties.cvssVersion.type (Total Keys: 1) #### containeranalysis:v1beta1 The following keys were added: - schemas.Assessment (Total Keys: 10) - schemas.GrafeasV1beta1VulnerabilityDetails.properties.cvssV2.$ref (Total Keys: 1) - schemas.GrafeasV1beta1VulnerabilityDetails.properties.cvssV3.$ref (Total Keys: 1) - schemas.GrafeasV1beta1VulnerabilityDetails.properties.vexAssessment.$ref (Total Keys: 1) - schemas.Note.properties.vulnerabilityAssessment.$ref (Total Keys: 1) - schemas.Product (Total Keys: 5) - schemas.Publisher (Total Keys: 5) - schemas.Remediation (Total Keys: 7) - schemas.Threat (Total Keys: 4) - schemas.VexAssessment (Total Keys: 11) - schemas.VulnerabilityAssessmentNote (Total Keys: 6)
1 parent 3321e01 commit 911b255

14 files changed

+2776
-17
lines changed

docs/dyn/containeranalysis_v1.projects.notes.html

Lines changed: 112 additions & 0 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1.projects.notes.occurrences.html

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -698,6 +698,20 @@ <h3>Method Details</h3>
698698
},
699699
&quot;vulnerability&quot;: { # An occurrence of a severity vulnerability on a resource. # Describes a security vulnerability.
700700
&quot;cvssScore&quot;: 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
701+
&quot;cvssV2&quot;: { # Common Vulnerability Scoring System. For details, see https://www.first.org/cvss/specification-document This is a message we will try to use for storing various versions of CVSS rather than making a separate proto for storing a specific version. # The cvss v2 score for the vulnerability.
702+
&quot;attackComplexity&quot;: &quot;A String&quot;,
703+
&quot;attackVector&quot;: &quot;A String&quot;, # Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments.
704+
&quot;authentication&quot;: &quot;A String&quot;,
705+
&quot;availabilityImpact&quot;: &quot;A String&quot;,
706+
&quot;baseScore&quot;: 3.14, # The base score is a function of the base metric scores.
707+
&quot;confidentialityImpact&quot;: &quot;A String&quot;,
708+
&quot;exploitabilityScore&quot;: 3.14,
709+
&quot;impactScore&quot;: 3.14,
710+
&quot;integrityImpact&quot;: &quot;A String&quot;,
711+
&quot;privilegesRequired&quot;: &quot;A String&quot;,
712+
&quot;scope&quot;: &quot;A String&quot;,
713+
&quot;userInteraction&quot;: &quot;A String&quot;,
714+
},
701715
&quot;cvssVersion&quot;: &quot;A String&quot;, # Output only. CVSS version used to populate cvss_score and severity.
702716
&quot;cvssv3&quot;: { # Common Vulnerability Scoring System. For details, see https://www.first.org/cvss/specification-document This is a message we will try to use for storing various versions of CVSS rather than making a separate proto for storing a specific version. # The cvss v3 score for the vulnerability.
703717
&quot;attackComplexity&quot;: &quot;A String&quot;,

docs/dyn/containeranalysis_v1.projects.occurrences.html

Lines changed: 126 additions & 0 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1alpha1.projects.notes.html

Lines changed: 294 additions & 0 deletions
Large diffs are not rendered by default.

docs/dyn/containeranalysis_v1alpha1.projects.notes.occurrences.html

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -768,6 +768,20 @@ <h3>Method Details</h3>
768768
},
769769
&quot;vulnerabilityDetails&quot;: { # Used by Occurrence to point to where the vulnerability exists and how to fix it. # Details of a security vulnerability note.
770770
&quot;cvssScore&quot;: 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a scale of 0-10 where 0 indicates low severity and 10 indicates high severity.
771+
&quot;cvssV2&quot;: { # Common Vulnerability Scoring System. This message is compatible with CVSS v2 and v3. For CVSS v2 details, see https://www.first.org/cvss/v2/guide CVSS v2 calculator: https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator For CVSS v3 details, see https://www.first.org/cvss/specification-document CVSS v3 calculator: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator # The CVSS v2 score of this vulnerability.
772+
&quot;attackComplexity&quot;: &quot;A String&quot;, # Defined in CVSS v3, CVSS v2
773+
&quot;attackVector&quot;: &quot;A String&quot;, # Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Defined in CVSS v3, CVSS v2
774+
&quot;authentication&quot;: &quot;A String&quot;, # Defined in CVSS v2
775+
&quot;availabilityImpact&quot;: &quot;A String&quot;, # Defined in CVSS v3, CVSS v2
776+
&quot;baseScore&quot;: 3.14, # The base score is a function of the base metric scores.
777+
&quot;confidentialityImpact&quot;: &quot;A String&quot;, # Defined in CVSS v3, CVSS v2
778+
&quot;exploitabilityScore&quot;: 3.14,
779+
&quot;impactScore&quot;: 3.14,
780+
&quot;integrityImpact&quot;: &quot;A String&quot;, # Defined in CVSS v3, CVSS v2
781+
&quot;privilegesRequired&quot;: &quot;A String&quot;, # Defined in CVSS v3
782+
&quot;scope&quot;: &quot;A String&quot;, # Defined in CVSS v3
783+
&quot;userInteraction&quot;: &quot;A String&quot;, # Defined in CVSS v3
784+
},
771785
&quot;cvssV3&quot;: { # Common Vulnerability Scoring System. This message is compatible with CVSS v2 and v3. For CVSS v2 details, see https://www.first.org/cvss/v2/guide CVSS v2 calculator: https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator For CVSS v3 details, see https://www.first.org/cvss/specification-document CVSS v3 calculator: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator # The CVSS v3 score of this vulnerability.
772786
&quot;attackComplexity&quot;: &quot;A String&quot;, # Defined in CVSS v3, CVSS v2
773787
&quot;attackVector&quot;: &quot;A String&quot;, # Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. Defined in CVSS v3, CVSS v2
@@ -782,6 +796,7 @@ <h3>Method Details</h3>
782796
&quot;scope&quot;: &quot;A String&quot;, # Defined in CVSS v3
783797
&quot;userInteraction&quot;: &quot;A String&quot;, # Defined in CVSS v3
784798
},
799+
&quot;cvssVersion&quot;: &quot;A String&quot;, # Output only. CVSS version used to populate cvss_score and severity.
785800
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # The distro assigned severity for this vulnerability when that is available and note provider assigned severity when distro has not yet assigned a severity for this vulnerability. When there are multiple package issues for this vulnerability, they can have different effective severities because some might come from the distro and some might come from installed language packs (e.g. Maven JARs or Go binaries). For this reason, it is advised to use the effective severity on the PackageIssue level, as this field may eventually be deprecated. In the case where multiple PackageIssues have different effective severities, the one set here will be the highest severity of any of the PackageIssues.
786801
&quot;packageIssue&quot;: [ # The set of affected locations and their fixes (if available) within the associated resource.
787802
{ # This message wraps a location affected by a vulnerability and its associated fix (if one is available).
@@ -824,6 +839,34 @@ <h3>Method Details</h3>
824839
],
825840
&quot;severity&quot;: &quot;A String&quot;, # Output only. The note provider assigned Severity of the vulnerability.
826841
&quot;type&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc). This may be deprecated in the future because we can have multiple PackageIssues with different package types.
842+
&quot;vexAssessment&quot;: { # VexAssessment provides all publisher provided Vex information that is related to this vulnerability. # VexAssessment provides all publisher provided Vex information that is related to this vulnerability for this resource.
843+
&quot;cve&quot;: &quot;A String&quot;, # Holds the MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.
844+
&quot;noteName&quot;: &quot;A String&quot;, # The VulnerabilityAssessment note from which this VexAssessment was generated. This will be of the form: `projects/[PROJECT_ID]/notes/[NOTE_ID]`.
845+
&quot;relatedUris&quot;: [ # Holds a list of references associated with this vulnerability item and assessment. These uris have additional information about the vulnerability and the assessment itself. E.g. Link to a document which details how this assessment concluded the state of this vulnerability.
846+
{ # An URI message.
847+
&quot;label&quot;: &quot;A String&quot;, # A label for the URI.
848+
&quot;uri&quot;: &quot;A String&quot;, # The unique resource identifier.
849+
},
850+
],
851+
&quot;remediations&quot;: [ # Specifies details on how to handle (and presumably, fix) a vulnerability.
852+
{ # Specifies details on how to handle (and presumably, fix) a vulnerability.
853+
&quot;details&quot;: &quot;A String&quot;, # Contains a comprehensive human-readable discussion of the remediation.
854+
&quot;remediationTime&quot;: &quot;A String&quot;, # Contains the date from which the remediation is available.
855+
&quot;remediationType&quot;: &quot;A String&quot;, # The type of remediation that can be applied.
856+
&quot;remediationUri&quot;: { # An URI message. # Contains the URL where to obtain the remediation.
857+
&quot;label&quot;: &quot;A String&quot;, # A label for the URI.
858+
&quot;uri&quot;: &quot;A String&quot;, # The unique resource identifier.
859+
},
860+
},
861+
],
862+
&quot;state&quot;: &quot;A String&quot;, # Provides the state of this Vulnerability assessment.
863+
&quot;threats&quot;: [ # Contains information about this vulnerability, this will change with time.
864+
{ # Contains the vulnerability kinetic information. This information can change as the vulnerability ages and new information becomes available.
865+
&quot;details&quot;: &quot;A String&quot;, # Represents a thorough human-readable discussion of the threat.
866+
&quot;threatType&quot;: &quot;A String&quot;, # The type of threat.
867+
},
868+
],
869+
},
827870
},
828871
},
829872
],

0 commit comments

Comments
 (0)