Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 6e7133e

Browse files
committedSep 25, 2023
feat(containeranalysis): update the api
#### containeranalysis:v1 The following keys were added: - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedConnectedRepository (Total Keys: 2) - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedGitSource (Total Keys: 2) - schemas.VulnerabilityNote.properties.extraDetails.type (Total Keys: 1) #### containeranalysis:v1alpha1 The following keys were added: - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedConnectedRepository (Total Keys: 2) - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedGitSource (Total Keys: 2) #### containeranalysis:v1beta1 The following keys were added: - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedConnectedRepository (Total Keys: 2) - schemas.ContaineranalysisGoogleDevtoolsCloudbuildV1SourceProvenance.properties.resolvedGitSource (Total Keys: 2) - schemas.Discovered.properties.lastScanTime (Total Keys: 2) - schemas.Vulnerability.properties.extraDetails.type (Total Keys: 1)
1 parent 8385fc0 commit 6e7133e

8 files changed

+96
-26
lines changed
 

‎docs/dyn/containeranalysis_v1.projects.notes.html

+8
Original file line numberDiff line numberDiff line change
@@ -347,6 +347,7 @@ <h3>Method Details</h3>
347347
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
348348
},
349349
],
350+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
350351
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
351352
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
352353
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -646,6 +647,7 @@ <h3>Method Details</h3>
646647
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
647648
},
648649
],
650+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
649651
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
650652
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
651653
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -950,6 +952,7 @@ <h3>Method Details</h3>
950952
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
951953
},
952954
],
955+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
953956
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
954957
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
955958
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1246,6 +1249,7 @@ <h3>Method Details</h3>
12461249
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
12471250
},
12481251
],
1252+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
12491253
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
12501254
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
12511255
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1566,6 +1570,7 @@ <h3>Method Details</h3>
15661570
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
15671571
},
15681572
],
1573+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
15691574
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
15701575
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
15711576
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -1917,6 +1922,7 @@ <h3>Method Details</h3>
19171922
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
19181923
},
19191924
],
1925+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
19201926
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
19211927
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
19221928
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -2230,6 +2236,7 @@ <h3>Method Details</h3>
22302236
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
22312237
},
22322238
],
2239+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
22332240
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
22342241
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
22352242
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.
@@ -2526,6 +2533,7 @@ <h3>Method Details</h3>
25262533
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
25272534
},
25282535
],
2536+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
25292537
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
25302538
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
25312539
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.

‎docs/dyn/containeranalysis_v1.projects.occurrences.html

+1
Original file line numberDiff line numberDiff line change
@@ -4516,6 +4516,7 @@ <h3>Method Details</h3>
45164516
&quot;vendor&quot;: &quot;A String&quot;, # The name of the vendor of the product.
45174517
},
45184518
],
4519+
&quot;extraDetails&quot;: &quot;A String&quot;, # Occurrence-specific extra details about the vulnerability.
45194520
&quot;severity&quot;: &quot;A String&quot;, # The note provider assigned severity of this vulnerability.
45204521
&quot;sourceUpdateTime&quot;: &quot;A String&quot;, # The time this information was last changed at the source. This is an upstream timestamp from the underlying information source - e.g. Ubuntu security tracker.
45214522
&quot;windowsDetails&quot;: [ # Windows details get their own format because the information format and model don&#x27;t match a normal detail. Specifically Windows updates are done as patches, thus Windows vulnerabilities really are a missing package, rather than a package being at an incorrect version.

0 commit comments

Comments
 (0)
Please sign in to comment.