Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
67 commits
Select commit Hold shift + click to select a range
1c899a4
chore(adexchangebuyer): update the api
yoshi-automation Jun 10, 2021
724341e
chore(adexchangebuyer2): update the api
yoshi-automation Jun 10, 2021
8f1b36a
chore(admin): update the api
yoshi-automation Jun 10, 2021
12a5e0d
chore(adsense): update the api
yoshi-automation Jun 10, 2021
5a97a03
chore(androiddeviceprovisioning): update the api
yoshi-automation Jun 10, 2021
2ae1441
chore(apikeys): update the api
yoshi-automation Jun 10, 2021
ffcf860
feat(appengine): update the api
yoshi-automation Jun 10, 2021
e109836
chore(binaryauthorization): update the api
yoshi-automation Jun 10, 2021
e712334
chore(calendar): update the api
yoshi-automation Jun 10, 2021
8c7101f
chore(chromemanagement): update the api
yoshi-automation Jun 10, 2021
93b4d55
chore(chromepolicy): update the api
yoshi-automation Jun 10, 2021
3367abb
chore(chromeuxreport): update the api
yoshi-automation Jun 10, 2021
73a4007
chore(cloudiot): update the api
yoshi-automation Jun 10, 2021
c5d95ba
chore(cloudsearch): update the api
yoshi-automation Jun 10, 2021
0d1dd5f
chore(cloudtasks): update the api
yoshi-automation Jun 10, 2021
975d3e2
chore(cloudtrace): update the api
yoshi-automation Jun 10, 2021
9a1c70b
feat(containeranalysis): update the api
yoshi-automation Jun 10, 2021
7762d17
chore(datacatalog): update the api
yoshi-automation Jun 10, 2021
1991926
chore(deploymentmanager): update the api
yoshi-automation Jun 10, 2021
39eaf57
chore(digitalassetlinks): update the api
yoshi-automation Jun 10, 2021
07a6e77
feat(documentai): update the api
yoshi-automation Jun 10, 2021
5be34a7
chore(domains): update the api
yoshi-automation Jun 10, 2021
773910f
feat(drive): update the api
yoshi-automation Jun 10, 2021
be1deb4
chore(essentialcontacts): update the api
yoshi-automation Jun 10, 2021
3facac1
chore(factchecktools): update the api
yoshi-automation Jun 10, 2021
86e86d8
chore(fcm): update the api
yoshi-automation Jun 10, 2021
e299bc7
chore(firebase): update the api
yoshi-automation Jun 10, 2021
89316e0
chore(firebasedatabase): update the api
yoshi-automation Jun 10, 2021
bca4c68
chore(gamesConfiguration): update the api
yoshi-automation Jun 10, 2021
bf1e305
chore(gkehub): update the api
yoshi-automation Jun 10, 2021
70ee7b7
chore(gmailpostmastertools): update the api
yoshi-automation Jun 10, 2021
d0a7847
chore(groupssettings): update the api
yoshi-automation Jun 10, 2021
c356039
chore(homegraph): update the api
yoshi-automation Jun 10, 2021
2c79e55
chore(indexing): update the api
yoshi-automation Jun 10, 2021
5106716
chore(libraryagent): update the api
yoshi-automation Jun 10, 2021
6ec8094
chore(licensing): update the api
yoshi-automation Jun 10, 2021
be7a748
chore(localservices): update the api
yoshi-automation Jun 10, 2021
e96adbb
feat(managedidentities): update the api
yoshi-automation Jun 10, 2021
1121bb8
chore(mybusinessaccountmanagement): update the api
yoshi-automation Jun 10, 2021
227e2a2
chore(mybusinesslodging): update the api
yoshi-automation Jun 10, 2021
b735219
chore(mybusinessplaceactions): update the api
yoshi-automation Jun 10, 2021
4ac58c3
chore(orgpolicy): update the api
yoshi-automation Jun 10, 2021
c2ef735
chore(pagespeedonline): update the api
yoshi-automation Jun 10, 2021
885466d
chore(paymentsresellersubscription): update the api
yoshi-automation Jun 10, 2021
0fa70a1
chore(people): update the api
yoshi-automation Jun 10, 2021
8a81cfb
chore(playcustomapp): update the api
yoshi-automation Jun 10, 2021
5c881d3
chore(prod_tt_sasportal): update the api
yoshi-automation Jun 10, 2021
c63707e
chore(pubsub): update the api
yoshi-automation Jun 10, 2021
14373af
chore(realtimebidding): update the api
yoshi-automation Jun 10, 2021
1619e67
chore(remotebuildexecution): update the api
yoshi-automation Jun 10, 2021
a46e793
chore(reseller): update the api
yoshi-automation Jun 10, 2021
625e0f4
chore(run): update the api
yoshi-automation Jun 10, 2021
0247bde
chore(runtimeconfig): update the api
yoshi-automation Jun 10, 2021
4ac70b8
chore(safebrowsing): update the api
yoshi-automation Jun 10, 2021
452cec1
chore(searchconsole): update the api
yoshi-automation Jun 10, 2021
612f8aa
chore(securitycenter): update the api
yoshi-automation Jun 10, 2021
54348ca
chore(serviceconsumermanagement): update the api
yoshi-automation Jun 10, 2021
d67640d
chore(servicenetworking): update the api
yoshi-automation Jun 10, 2021
3b7cf36
chore(serviceusage): update the api
yoshi-automation Jun 10, 2021
87da2f3
feat(spanner): update the api
yoshi-automation Jun 10, 2021
7dcf769
chore(storagetransfer): update the api
yoshi-automation Jun 10, 2021
65b2ab5
chore(streetviewpublish): update the api
yoshi-automation Jun 10, 2021
06c1fc6
chore(tasks): update the api
yoshi-automation Jun 10, 2021
970bf88
chore(vault): update the api
yoshi-automation Jun 10, 2021
fae72d0
chore(videointelligence): update the api
yoshi-automation Jun 10, 2021
efcff23
chore(webrisk): update the api
yoshi-automation Jun 10, 2021
650263f
chore(docs): Add new discovery artifacts and reference documents
yoshi-automation Jun 10, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
feat(containeranalysis): update the api
#### containeranalysis:v1alpha1

The following keys were added:
- schemas.CisBenchmark (Total Keys: 5)
- schemas.ComplianceNote (Total Keys: 9)
- schemas.ComplianceOccurrence (Total Keys: 5)
- schemas.ComplianceVersion (Total Keys: 4)
- schemas.NonCompliantFile (Total Keys: 5)
- schemas.Note.properties.compliance.$ref (Total Keys: 1)
- schemas.Occurrence.properties.compliance.$ref (Total Keys: 1)
  • Loading branch information
yoshi-automation committed Jun 10, 2021
commit 9a1c70b7df3e074fc9fbd0eebdaf75a91046078c
102 changes: 102 additions & 0 deletions docs/dyn/containeranalysis_v1alpha1.projects.notes.html
Original file line number Diff line number Diff line change
Expand Up @@ -149,6 +149,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down Expand Up @@ -287,6 +304,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down Expand Up @@ -448,6 +482,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down Expand Up @@ -641,6 +692,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down Expand Up @@ -795,6 +863,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down Expand Up @@ -932,6 +1017,23 @@ <h3>Method Details</h3>
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
},
},
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
},
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -255,6 +255,16 @@ <h3>Method Details</h3>
},
&quot;provenanceBytes&quot;: &quot;A String&quot;, # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
&quot;compliance&quot;: { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
&quot;nonComplianceReason&quot;: &quot;A String&quot;, # The reason for non compliance of these files.
&quot;nonCompliantFiles&quot;: [ # A list of files which are violating compliance checks.
{ # Details about files that caused a compliance check to fail.
&quot;displayCommand&quot;: &quot;A String&quot;, # Command to display the non-compliant files.
&quot;path&quot;: &quot;A String&quot;, # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;. Empty if `display_command` is set.
&quot;reason&quot;: &quot;A String&quot;, # Explains why a file is non compliant for a CIS check.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this `Occurrence` was created.
&quot;deployment&quot;: { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
&quot;address&quot;: &quot;A String&quot;, # Address of the runtime element hosting this deployment.
Expand Down
Loading