docs: update docs (#916)
* fix: re-run script
* test: fix noxfile
diff --git a/docs/dyn/containeranalysis_v1beta1.projects.occurrences.html b/docs/dyn/containeranalysis_v1beta1.projects.occurrences.html
index 2bddbf1..5c29a7e 100644
--- a/docs/dyn/containeranalysis_v1beta1.projects.occurrences.html
+++ b/docs/dyn/containeranalysis_v1beta1.projects.occurrences.html
@@ -124,6 +124,421 @@
{ # Request to create occurrences in batch.
"occurrences": [ # Required. The occurrences to create. Max allowed length is 1000.
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -203,14 +618,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -226,421 +641,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
},
],
}
@@ -656,6 +656,421 @@
{ # Response for creating occurrences in batch.
"occurrences": [ # The occurrences that were created.
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -735,14 +1150,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -758,421 +1173,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
},
],
}</pre>
@@ -1189,6 +1189,421 @@
The object takes the form of:
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -1268,14 +1683,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -1291,421 +1706,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
}
x__xgafv: string, V1 error format.
@@ -1717,6 +1717,421 @@
An object of the form:
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -1796,14 +2211,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -1819,421 +2234,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
}</pre>
</div>
@@ -2282,6 +2282,421 @@
An object of the form:
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -2361,14 +2776,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -2384,421 +2799,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
}</pre>
</div>
@@ -2912,6 +2912,18 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"version": 42, # Specifies the format of the policy.
#
# Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
@@ -2940,6 +2952,58 @@
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
+ "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
+ #
+ # If the condition evaluates to `true`, then this binding applies to the
+ # current request.
+ #
+ # If the condition evaluates to `false`, then this binding does not apply to
+ # the current request. However, a different role binding might grant the same
+ # role to one or more of the members in this binding.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
+ # are documented at https://github.com/google/cel-spec.
+ #
+ # Example (Comparison):
+ #
+ # title: "Summary size limit"
+ # description: "Determines if a summary is less than 100 chars"
+ # expression: "document.summary.size() < 100"
+ #
+ # Example (Equality):
+ #
+ # title: "Requestor is owner"
+ # description: "Determines if requestor is the document owner"
+ # expression: "document.owner == request.auth.claims.email"
+ #
+ # Example (Logic):
+ #
+ # title: "Public documents"
+ # description: "Determine whether the document should be publicly visible"
+ # expression: "document.type != 'private' && document.type != 'internal'"
+ #
+ # Example (Data Manipulation):
+ #
+ # title: "Notification string"
+ # description: "Create a notification string with a timestamp."
+ # expression: "'New message received at ' + string(document.create_time)"
+ #
+ # The exact variables and functions that may be referenced within an expression
+ # are determined by the service that evaluates it. See the service
+ # documentation for additional information.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "title": "A String", # Optional. Title for the expression, i.e. a short string describing
+ # its purpose. This can be used e.g. in UIs which allow to enter the
+ # expression.
+ "location": "A String", # Optional. String indicating the location of the expression for error
+ # reporting, e.g. a file name and a position in the file.
+ },
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
#
@@ -2987,72 +3051,8 @@
],
"role": "A String", # Role that is assigned to `members`.
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
- "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
- #
- # If the condition evaluates to `true`, then this binding applies to the
- # current request.
- #
- # If the condition evaluates to `false`, then this binding does not apply to
- # the current request. However, a different role binding might grant the same
- # role to one or more of the members in this binding.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM
- # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
- # are documented at https://github.com/google/cel-spec.
- #
- # Example (Comparison):
- #
- # title: "Summary size limit"
- # description: "Determines if a summary is less than 100 chars"
- # expression: "document.summary.size() < 100"
- #
- # Example (Equality):
- #
- # title: "Requestor is owner"
- # description: "Determines if requestor is the document owner"
- # expression: "document.owner == request.auth.claims.email"
- #
- # Example (Logic):
- #
- # title: "Public documents"
- # description: "Determine whether the document should be publicly visible"
- # expression: "document.type != 'private' && document.type != 'internal'"
- #
- # Example (Data Manipulation):
- #
- # title: "Notification string"
- # description: "Create a notification string with a timestamp."
- # expression: "'New message received at ' + string(document.create_time)"
- #
- # The exact variables and functions that may be referenced within an expression
- # are determined by the service that evaluates it. See the service
- # documentation for additional information.
- "title": "A String", # Optional. Title for the expression, i.e. a short string describing
- # its purpose. This can be used e.g. in UIs which allow to enter the
- # expression.
- "location": "A String", # Optional. String indicating the location of the expression for error
- # reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
- },
},
],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
}</pre>
</div>
@@ -3073,121 +3073,6 @@
An object of the form:
{ # A type of analysis that can be done for a resource.
- "package": { # This represents a particular package that is distributed over various # A note describing a package hosted by various package managers.
- # channels. E.g., glibc (aka libc6) is distributed by many, at various
- # versions.
- "name": "A String", # Required. Immutable. The name of the package.
- "distribution": [ # The various channels by which a package is distributed.
- { # This represents a particular channel of distribution for a given package.
- # E.g., Debian's jessie-backports dpkg mirror.
- "latestVersion": { # Version contains structured information about the version of a package. # The latest available version of this package in this distribution channel.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "description": "A String", # The distribution channel-specific description of this package.
- "cpeUri": "A String", # Required. The cpe_uri in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- "url": "A String", # The distribution channel-specific homepage for this package.
- "architecture": "A String", # The CPU architecture for which packages in this distribution channel were
- # built.
- "maintainer": "A String", # A freeform string denoting the maintainer of this package.
- },
- ],
- },
- "createTime": "A String", # Output only. The time this note was created. This field can be used as a
- # filter in list requests.
- "updateTime": "A String", # Output only. The time this note was last updated. This field can be used as
- # a filter in list requests.
- "discovery": { # A note that indicates a type of analysis a provider would perform. This note # A note describing the initial analysis of a resource.
- # exists in a provider's project. A `Discovery` occurrence is created in a
- # consumer's project at the start of analysis.
- "analysisKind": "A String", # Required. Immutable. The kind of analysis that is handled by this
- # discovery.
- },
- "relatedUrl": [ # URLs associated with this note.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "intoto": { # This contains the fields corresponding to the definition of a software supply # A note describing an in-toto link.
- # chain step in an in-toto layout. This information goes into a Grafeas note.
- "expectedMaterials": [ # The following fields contain in-toto artifact rules identifying the
- # artifacts that enter this supply chain step, and exit the supply chain
- # step, i.e. materials and products of the step.
- { # Defines an object to declare an in-toto artifact rule
- "artifactRule": [
- "A String",
- ],
- },
- ],
- "expectedCommand": [ # This field contains the expected command used to perform the step.
- "A String",
- ],
- "expectedProducts": [
- { # Defines an object to declare an in-toto artifact rule
- "artifactRule": [
- "A String",
- ],
- },
- ],
- "stepName": "A String", # This field identifies the name of the step in the supply chain.
- "signingKeys": [ # This field contains the public keys that can be used to verify the
- # signatures on the step metadata.
- { # This defines the format used to record keys used in the software supply
- # chain. An in-toto link is attested using one or more keys defined in the
- # in-toto layout. An example of this is:
- # {
- # "key_id": "776a00e29f3559e0141b3b096f696abc6cfb0c657ab40f441132b345b0...",
- # "key_type": "rsa",
- # "public_key_value": "-----BEGIN PUBLIC KEY-----\nMIIBojANBgkqhkiG9w0B...",
- # "key_scheme": "rsassa-pss-sha256"
- # }
- # The format for in-toto's key definition can be found in section 4.2 of the
- # in-toto specification.
- "keyType": "A String", # This field identifies the specific signing method. Eg: "rsa", "ed25519",
- # and "ecdsa".
- "keyScheme": "A String", # This field contains the corresponding signature scheme.
- # Eg: "rsassa-pss-sha256".
- "keyId": "A String", # key_id is an identifier for the signing key.
- "publicKeyValue": "A String", # This field contains the actual public key.
- },
- ],
- "threshold": "A String", # This field contains a value that indicates the minimum number of keys that
- # need to be used to sign the step's in-toto link.
- },
- "expirationTime": "A String", # Time of expiration for this note. Empty if note does not expire.
- "baseImage": { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
- # relationship. Linked occurrences are derived from this or an
- # equivalent image via:
- # FROM <Basis.resource_url>
- # Or an equivalent reference, e.g. a tag of the resource_url.
- "fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. Immutable. The fingerprint of the base image.
- "v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
- # representation.
- "v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
- # [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
- # Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
- },
- "resourceUrl": "A String", # Required. Immutable. The resource_url for the resource representing the
- # basis of associated occurrence images.
- },
- "kind": "A String", # Output only. The type of analysis. This field can be used as a filter in
- # list requests.
- "deployable": { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
- "resourceUri": [ # Required. Resource URI for the artifact being deployed.
- "A String",
- ],
- },
- "longDescription": "A String", # A detailed description of this note.
- "shortDescription": "A String", # A one sentence description of this note.
"attestationAuthority": { # Note kind that represents a logical attestation "role" or "authority". For # A note describing an attestation role.
# example, an organization might have one `Authority` for "QA" and one for
# "build". This note is intended to act strictly as a grouping mechanism for
@@ -3210,6 +3095,22 @@
"name": "A String", # Output only. The name of the note in the form of
# `projects/[PROVIDER_ID]/notes/[NOTE_ID]`.
"vulnerability": { # Vulnerability provides metadata about a security vulnerability in a Note. # A note describing a package vulnerability.
+ "cvssV3": { # Common Vulnerability Scoring System version 3. # The full description of the CVSSv3.
+ # For details, see https://www.first.org/cvss/specification-document
+ "baseScore": 3.14, # The base score is a function of the base metric scores.
+ "scope": "A String",
+ "integrityImpact": "A String",
+ "exploitabilityScore": 3.14,
+ "impactScore": 3.14,
+ "attackComplexity": "A String",
+ "availabilityImpact": "A String",
+ "privilegesRequired": "A String",
+ "userInteraction": "A String",
+ "attackVector": "A String", # Base Metrics
+ # Represents the intrinsic characteristics of a vulnerability that are
+ # constant over time and across user environments.
+ "confidentialityImpact": "A String",
+ },
"sourceUpdateTime": "A String", # The time this information was last changed at the source. This is an
# upstream timestamp from the underlying information source - e.g. Ubuntu
# security tracker.
@@ -3229,14 +3130,13 @@
# multiple KBs) that mitigate a given vulnerability. Currently any listed
# kb's presence is considered a fix.
{
+ "name": "A String", # The KB name (generally of the form KB[0-9]+ i.e. KB123456).
"url": "A String", # A link to the KB in the Windows update catalog -
# https://www.catalog.update.microsoft.com/
- "name": "A String", # The KB name (generally of the form KB[0-9]+ i.e. KB123456).
},
],
},
],
- "severity": "A String", # Note provider assigned impact of the vulnerability.
"details": [ # All information about the package to specifically identify this
# vulnerability. One entry per (version range and cpe_uri) the package
# vulnerability has manifested in.
@@ -3253,12 +3153,12 @@
"fixedLocation": { # The location of the vulnerability. # The fix for this specific package version.
"package": "A String", # Required. The package being described.
"version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
"name": "A String", # Required only when version kind is NORMAL. The main part of the version
# name.
"kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
# versions.
"epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
},
"cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
# format. Examples include distro or storage location for vulnerable jar.
@@ -3270,48 +3170,32 @@
"description": "A String", # A vendor-specific description of this note.
"severityName": "A String", # The severity (eg: distro assigned severity) for this vulnerability.
"minAffectedVersion": { # Version contains structured information about the version of a package. # The min version of the package in which the vulnerability exists.
+ "revision": "A String", # The iteration of the package build from the above version.
"name": "A String", # Required only when version kind is NORMAL. The main part of the version
# name.
"kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
# versions.
"epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
},
"maxAffectedVersion": { # Version contains structured information about the version of a package. # The max version of the package in which the vulnerability exists.
+ "revision": "A String", # The iteration of the package build from the above version.
"name": "A String", # Required only when version kind is NORMAL. The main part of the version
# name.
"kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
# versions.
"epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
},
"package": "A String", # Required. The name of the package where the vulnerability was found.
},
],
+ "severity": "A String", # Note provider assigned impact of the vulnerability.
"cvssScore": 3.14, # The CVSS score for this vulnerability.
- "cvssV3": { # Common Vulnerability Scoring System version 3. # The full description of the CVSSv3.
- # For details, see https://www.first.org/cvss/specification-document
- "scope": "A String",
- "integrityImpact": "A String",
- "exploitabilityScore": 3.14,
- "impactScore": 3.14,
- "attackComplexity": "A String",
- "availabilityImpact": "A String",
- "privilegesRequired": "A String",
- "userInteraction": "A String",
- "attackVector": "A String", # Base Metrics
- # Represents the intrinsic characteristics of a vulnerability that are
- # constant over time and across user environments.
- "confidentialityImpact": "A String",
- "baseScore": 3.14, # The base score is a function of the base metric scores.
- },
},
"relatedNoteNames": [ # Other notes related to this note.
"A String",
],
"build": { # Note holding the version of the provider's builder and the signature of the # A note describing build provenance for a verifiable build.
# provenance message in the build details occurrence.
- "builderVersion": "A String", # Required. Immutable. Version of the builder which produced this build.
"signature": { # Message encapsulating the signature of the verified build. # Signature of the build in occurrences pointing to this build note
# containing build details.
"keyType": "A String", # The type of the key, either stored in `public_key` or referenced in
@@ -3336,7 +3220,123 @@
# CN for a cert), or a reference to an external key (such as a reference to a
# key in Cloud Key Management Service).
},
+ "builderVersion": "A String", # Required. Immutable. Version of the builder which produced this build.
},
+ "package": { # This represents a particular package that is distributed over various # A note describing a package hosted by various package managers.
+ # channels. E.g., glibc (aka libc6) is distributed by many, at various
+ # versions.
+ "name": "A String", # Required. Immutable. The name of the package.
+ "distribution": [ # The various channels by which a package is distributed.
+ { # This represents a particular channel of distribution for a given package.
+ # E.g., Debian's jessie-backports dpkg mirror.
+ "maintainer": "A String", # A freeform string denoting the maintainer of this package.
+ "latestVersion": { # Version contains structured information about the version of a package. # The latest available version of this package in this distribution channel.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "description": "A String", # The distribution channel-specific description of this package.
+ "cpeUri": "A String", # Required. The cpe_uri in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "url": "A String", # The distribution channel-specific homepage for this package.
+ "architecture": "A String", # The CPU architecture for which packages in this distribution channel were
+ # built.
+ },
+ ],
+ },
+ "createTime": "A String", # Output only. The time this note was created. This field can be used as a
+ # filter in list requests.
+ "discovery": { # A note that indicates a type of analysis a provider would perform. This note # A note describing the initial analysis of a resource.
+ # exists in a provider's project. A `Discovery` occurrence is created in a
+ # consumer's project at the start of analysis.
+ "analysisKind": "A String", # Required. Immutable. The kind of analysis that is handled by this
+ # discovery.
+ },
+ "updateTime": "A String", # Output only. The time this note was last updated. This field can be used as
+ # a filter in list requests.
+ "intoto": { # This contains the fields corresponding to the definition of a software supply # A note describing an in-toto link.
+ # chain step in an in-toto layout. This information goes into a Grafeas note.
+ "expectedProducts": [
+ { # Defines an object to declare an in-toto artifact rule
+ "artifactRule": [
+ "A String",
+ ],
+ },
+ ],
+ "stepName": "A String", # This field identifies the name of the step in the supply chain.
+ "signingKeys": [ # This field contains the public keys that can be used to verify the
+ # signatures on the step metadata.
+ { # This defines the format used to record keys used in the software supply
+ # chain. An in-toto link is attested using one or more keys defined in the
+ # in-toto layout. An example of this is:
+ # {
+ # "key_id": "776a00e29f3559e0141b3b096f696abc6cfb0c657ab40f441132b345b0...",
+ # "key_type": "rsa",
+ # "public_key_value": "-----BEGIN PUBLIC KEY-----\nMIIBojANBgkqhkiG9w0B...",
+ # "key_scheme": "rsassa-pss-sha256"
+ # }
+ # The format for in-toto's key definition can be found in section 4.2 of the
+ # in-toto specification.
+ "keyId": "A String", # key_id is an identifier for the signing key.
+ "publicKeyValue": "A String", # This field contains the actual public key.
+ "keyType": "A String", # This field identifies the specific signing method. Eg: "rsa", "ed25519",
+ # and "ecdsa".
+ "keyScheme": "A String", # This field contains the corresponding signature scheme.
+ # Eg: "rsassa-pss-sha256".
+ },
+ ],
+ "threshold": "A String", # This field contains a value that indicates the minimum number of keys that
+ # need to be used to sign the step's in-toto link.
+ "expectedMaterials": [ # The following fields contain in-toto artifact rules identifying the
+ # artifacts that enter this supply chain step, and exit the supply chain
+ # step, i.e. materials and products of the step.
+ { # Defines an object to declare an in-toto artifact rule
+ "artifactRule": [
+ "A String",
+ ],
+ },
+ ],
+ "expectedCommand": [ # This field contains the expected command used to perform the step.
+ "A String",
+ ],
+ },
+ "relatedUrl": [ # URLs associated with this note.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "expirationTime": "A String", # Time of expiration for this note. Empty if note does not expire.
+ "baseImage": { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
+ # relationship. Linked occurrences are derived from this or an
+ # equivalent image via:
+ # FROM <Basis.resource_url>
+ # Or an equivalent reference, e.g. a tag of the resource_url.
+ "fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. Immutable. The fingerprint of the base image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
+ "v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
+ # representation.
+ "v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
+ # [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
+ # Only the name of the final blob is kept.
+ },
+ "resourceUrl": "A String", # Required. Immutable. The resource_url for the resource representing the
+ # basis of associated occurrence images.
+ },
+ "kind": "A String", # Output only. The type of analysis. This field can be used as a filter in
+ # list requests.
+ "longDescription": "A String", # A detailed description of this note.
+ "deployable": { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
+ "resourceUri": [ # Required. Resource URI for the artifact being deployed.
+ "A String",
+ ],
+ },
+ "shortDescription": "A String", # A one sentence description of this note.
}</pre>
</div>
@@ -3360,7 +3360,6 @@
# severity type.
"counts": [ # A listing by resource of the number of fixable and total vulnerabilities.
{ # Per resource and severity counts of fixable and total vulnerabilities.
- "fixableCount": "A String", # The number of fixable vulnerabilities associated with this resource.
"resource": { # An entity that can have metadata. For example, a Docker image. # The affected resource.
"name": "A String", # Deprecated, do not use. Use uri instead.
#
@@ -3378,6 +3377,7 @@
"severity": "A String", # The severity for this count. SEVERITY_UNSPECIFIED indicates total across
# all severities.
"totalCount": "A String", # The total number of vulnerabilities associated with this resource.
+ "fixableCount": "A String", # The number of fixable vulnerabilities associated with this resource.
},
],
}</pre>
@@ -3403,11 +3403,423 @@
An object of the form:
{ # Response for listing occurrences.
- "nextPageToken": "A String", # The next pagination token in the list response. It should be used as
- # `page_token` for the following request. An empty value means no more
- # results.
"occurrences": [ # The occurrences requested.
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -3487,14 +3899,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -3510,423 +3922,11 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
},
],
+ "nextPageToken": "A String", # The next pagination token in the list response. It should be used as
+ # `page_token` for the following request. An empty value means no more
+ # results.
}</pre>
</div>
@@ -3955,6 +3955,421 @@
The object takes the form of:
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -4034,14 +4449,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -4057,421 +4472,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
}
updateMask: string, The fields to update.
@@ -4484,6 +4484,421 @@
An object of the form:
{ # An instance of an analysis type that has been found on a resource.
+ "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
+ # specified. This field can be used as a filter in list requests.
+ "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
+ "name": "A String", # Deprecated, do not use. Use uri instead.
+ #
+ # The name of the resource. For example, the name of a Docker image -
+ # "Debian".
+ "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
+ #
+ # The hash of the resource content. For example, the Docker digest.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ "uri": "A String", # Required. The unique URI of the resource. For example,
+ # `https://gcr.io/project/image@sha256:foo` for a Docker image.
+ },
+ "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
+ "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
+ # attestation can be verified using the attached signature. If the verifier
+ # trusts the public key of the signer, then verifying the signature is
+ # sufficient to establish trust. In this circumstance, the authority to which
+ # this attestation is attached is primarily useful for look-up (how to find
+ # this attestation if you already know the authority and artifact to be
+ # verified) and intent (which authority was this attestation intended to sign
+ # for).
+ "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
+ # supports `ATTACHED` signatures, where the payload that is signed is included
+ # alongside the signature itself in the same file.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
+ # (GPG) or equivalent. Since this message only supports attached signatures,
+ # the payload that was signed must be attached. While the signature format
+ # supported is dependent on the verification implementation, currently only
+ # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
+ # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
+ # --output=signature.gpg payload.json` will create the signature content
+ # expected in this field in `signature.gpg` for the `payload.json`
+ # attestation payload.
+ "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
+ # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
+ # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
+ # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
+ # Implementations may choose to acknowledge "LONG", "SHORT", or other
+ # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
+ # In gpg, the full fingerprint can be retrieved from the `fpr` field
+ # returned when calling --list-keys with --with-colons. For example:
+ # ```
+ # gpg --with-colons --with-fingerprint --force-v4-certs \
+ # --list-keys attester@example.com
+ # tru::1:1513631572:0:3:1:5
+ # pub:...<SNIP>...
+ # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
+ # ```
+ # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
+ },
+ "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
+ # This attestation must define the `serialized_payload` that the `signatures`
+ # verify and any metadata necessary to interpret that plaintext. The
+ # signatures should always be over the `serialized_payload` bytestring.
+ "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
+ # The verifier must ensure that the provided type is one that the verifier
+ # supports, and that the attestation payload is a valid instantiation of that
+ # type (for example by validating a JSON schema).
+ "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
+ # should consider this attestation message verified if at least one
+ # `signature` verifies `serialized_payload`. See `Signature` in common.proto
+ # for more details on signature structure and verification.
+ { # Verifiers (e.g. Kritis implementations) MUST verify signatures
+ # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
+ # Typically this means that the verifier has been configured with a map from
+ # `public_key_id` to public key material (and any required parameters, e.g.
+ # signing algorithm).
+ #
+ # In particular, verification implementations MUST NOT treat the signature
+ # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
+ # DOES NOT validate or authenticate a public key; it only provides a mechanism
+ # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
+ # a trusted channel. Verification implementations MUST reject signatures in any
+ # of the following circumstances:
+ # * The `public_key_id` is not recognized by the verifier.
+ # * The public key that `public_key_id` refers to does not verify the
+ # signature with respect to the payload.
+ #
+ # The `signature` contents SHOULD NOT be "attached" (where the payload is
+ # included with the serialized `signature` bytes). Verifiers MUST ignore any
+ # "attached" payload and only verify signatures with respect to explicitly
+ # provided payload (e.g. a `payload` field on the proto message that holds
+ # this Signature, or the canonical serialization of the proto message that
+ # holds this signature).
+ "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
+ # * The `public_key_id` is required.
+ # * The `public_key_id` MUST be an RFC3986 conformant URI.
+ # * When possible, the `public_key_id` SHOULD be an immutable reference,
+ # such as a cryptographic digest.
+ #
+ # Examples of valid `public_key_id`s:
+ #
+ # OpenPGP V4 public key fingerprint:
+ # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
+ # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
+ # details on this scheme.
+ #
+ # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
+ # serialization):
+ # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
+ # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
+ "signature": "A String", # The content of the signature, an opaque bytestring.
+ # The payload that this signature verifies MUST be unambiguously provided
+ # with the Signature during verification. A wrapper message might provide
+ # the payload explicitly. Alternatively, a message might have a canonical
+ # serialization that can always be unambiguously computed to derive the
+ # payload.
+ },
+ ],
+ "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
+ # The encoding and semantic meaning of this payload must match what is set in
+ # `content_type`.
+ },
+ },
+ },
+ "name": "A String", # Output only. The name of the occurrence in the form of
+ # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
+ "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
+ "longDescription": "A String", # Output only. A detailed description of this vulnerability.
+ "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
+ "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
+ # available, and note provider assigned severity when distro has not yet
+ # assigned a severity for this vulnerability.
+ "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
+ "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
+ # scale of 0-10 where 0 indicates low severity and 10 indicates high
+ # severity.
+ "relatedUrls": [ # Output only. URLs related to this vulnerability.
+ { # Metadata for any related URL information.
+ "url": "A String", # Specific URL associated with the resource.
+ "label": "A String", # Label to describe usage of the URL.
+ },
+ ],
+ "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
+ # packages etc)
+ "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
+ # within the associated resource.
+ { # This message wraps a location affected by a vulnerability and its
+ # associated fix (if one is available).
+ "severityName": "A String", # Deprecated, use Details.effective_severity instead
+ # The severity (e.g., distro assigned severity) for this vulnerability.
+ "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
+ "package": "A String", # Required. The package being described.
+ "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
+ # format. Examples include distro or storage location for vulnerable jar.
+ },
+ },
+ ],
+ },
+ "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
+ "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
+ # system.
+ "location": [ # Required. All of the places within the filesystem versions of this package
+ # have been found.
+ { # An occurrence of a particular package installation found within a system's
+ # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
+ "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
+ # denoting the package manager version distributing a package.
+ "version": { # Version contains structured information about the version of a package. # The version installed at this location.
+ "revision": "A String", # The iteration of the package build from the above version.
+ "name": "A String", # Required only when version kind is NORMAL. The main part of the version
+ # name.
+ "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
+ # versions.
+ "epoch": 42, # Used to correct mistakes in the version numbering scheme.
+ },
+ "path": "A String", # The path from which we gathered that this package/version is installed.
+ },
+ ],
+ "name": "A String", # Output only. The name of the installed package.
+ },
+ },
+ "build": { # Details of a build occurrence. # Describes a verifiable build.
+ "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
+ # build signature in the corresponding build note. After verifying the
+ # signature, `provenance_bytes` can be unmarshalled and compared to the
+ # provenance to confirm that it is unchanged. A base64-encoded string
+ # representation of the provenance bytes is used for the signature in order
+ # to interoperate with openssl which expects this format for signature
+ # verification.
+ #
+ # The serialized form is captured both to avoid ambiguity in how the
+ # provenance is marshalled to json as well to prevent incompatibilities with
+ # future changes.
+ "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
+ # details about the build from source to completion.
+ "endTime": "A String", # Time at which execution of the build was finished.
+ "startTime": "A String", # Time at which execution of the build was started.
+ "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
+ "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
+ "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
+ # location.
+ "additionalContexts": [ # If provided, some of the source code used for the build may be found in
+ # these locations, in the case where the source repository had multiple
+ # remotes or submodules. This list will not include the context specified in
+ # the context field.
+ { # A SourceContext is a reference to a tree of files. A SourceContext together
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ ],
+ "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
+ # source integrity was maintained in the build.
+ #
+ # The keys to this map are file paths used as build source and the values
+ # contain the hash values for those files.
+ #
+ # If the build source came in a single package such as a gzipped tarfile
+ # (.tar.gz), the FileHash will be for the single path to that file.
+ "a_key": { # Container message for hashes of byte content of files, used in source
+ # messages to verify integrity of source input to the build.
+ "fileHash": [ # Required. Collection of file hashes.
+ { # Container message for hash values.
+ "type": "A String", # Required. The type of hash that was performed.
+ "value": "A String", # Required. The hash value.
+ },
+ ],
+ },
+ },
+ "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
+ # with a path point to a unique revision of a single file or directory.
+ "labels": { # Labels with user defined metadata.
+ "a_key": "A String",
+ },
+ "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
+ # repository (e.g., GitHub).
+ "url": "A String", # Git repository URL.
+ "revisionId": "A String", # Git commit hash.
+ },
+ "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
+ "hostUri": "A String", # The URI of a running Gerrit instance.
+ "revisionId": "A String", # A revision (commit) ID.
+ "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
+ # "project/subproject" is a valid project name. The "repo name" is the
+ # hostURI/project.
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
+ # Source Repo.
+ "revisionId": "A String", # A revision ID.
+ "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
+ "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
+ # winged-cargo-31) and a repo name within that project.
+ "projectId": "A String", # The ID of the project.
+ "repoName": "A String", # The name of the repo. Leave empty for the default repo.
+ },
+ "uid": "A String", # A server-assigned, globally unique identifier.
+ },
+ "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
+ "name": "A String", # The alias name.
+ "kind": "A String", # The alias kind.
+ },
+ },
+ },
+ },
+ "createTime": "A String", # Time at which the build was created.
+ "projectId": "A String", # ID of the project.
+ "logsUri": "A String", # URI where any logs for this provenance were written.
+ "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
+ # user's e-mail address at the time the build was initiated; this address may
+ # not represent the same end-user for all time.
+ "builderVersion": "A String", # Version string of the builder at the time this build was executed.
+ "commands": [ # Commands requested by the build.
+ { # Command describes a step performed as part of the build pipeline.
+ "dir": "A String", # Working directory (relative to project source root) used when running this
+ # command.
+ "waitFor": [ # The ID(s) of the command(s) that this command depends on.
+ "A String",
+ ],
+ "env": [ # Environment variables set before running this command.
+ "A String",
+ ],
+ "args": [ # Command-line arguments used when executing this command.
+ "A String",
+ ],
+ "name": "A String", # Required. Name of the command, as presented on the command line, or if the
+ # command is packaged as a Docker container, as presented to `docker pull`.
+ "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
+ # this command as a dependency.
+ },
+ ],
+ "builtArtifacts": [ # Output of the build.
+ { # Artifact describes a build product.
+ "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
+ # container.
+ "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
+ # like `gcr.io/projectID/imagename@sha256:123456`.
+ "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
+ # the case of a container build, the name used to push the container image to
+ # Google Container Registry, as presented to `docker push`. Note that a
+ # single Artifact ID can have multiple names, for example if two tags are
+ # applied to one image.
+ "A String",
+ ],
+ },
+ ],
+ "id": "A String", # Required. Unique identifier of the build.
+ "buildOptions": { # Special options applied to this build. This is a catch-all field where
+ # build providers can enter any desired additional details.
+ "a_key": "A String",
+ },
+ },
+ },
+ "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
+ "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
+ "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
+ # details to show to the user. The LocalizedMessage is output only and
+ # populated by the API.
+ # different programming environments, including REST APIs and RPC APIs. It is
+ # used by [gRPC](https://github.com/grpc). Each `Status` message contains
+ # three pieces of data: error code, error message, and error details.
+ #
+ # You can find out more about this error model and how to work with it in the
+ # [API Design Guide](https://cloud.google.com/apis/design/errors).
+ "details": [ # A list of messages that carry the error details. There is a common set of
+ # message types for APIs to use.
+ {
+ "a_key": "", # Properties of the object. Contains field @type with type URL.
+ },
+ ],
+ "code": 42, # The status code, which should be an enum value of google.rpc.Code.
+ "message": "A String", # A developer-facing error message, which should be in English. Any
+ # user-facing error message should be localized and sent in the
+ # google.rpc.Status.details field, or localized by the client.
+ },
+ "analysisStatus": "A String", # The status of discovery for the resource.
+ "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
+ "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
+ # Deprecated, do not use.
+ },
+ },
+ "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
+ # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
+ # used as a filter in list requests.
+ "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
+ "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
+ "userEmail": "A String", # Identity of the user that triggered this deployment.
+ "config": "A String", # Configuration used to create this deployment.
+ "undeployTime": "A String", # End of the lifetime of this deployment.
+ "platform": "A String", # Platform hosting this deployment.
+ "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
+ "address": "A String", # Address of the runtime element hosting this deployment.
+ "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
+ # the deployable field with the same name.
+ "A String",
+ ],
+ },
+ },
+ "createTime": "A String", # Output only. The time this occurrence was created.
"updateTime": "A String", # Output only. The time this occurrence was last updated.
"remediation": "A String", # A description of actions that can be taken to remedy the note.
"intoto": { # This corresponds to a signed in-toto link - it is made up of one or more # Describes a specific in-toto link.
@@ -4563,14 +4978,14 @@
# relationship. This image would be produced from a Dockerfile with FROM
# <DockerImage.Basis in attached Note>.
"fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
+ "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
+ "A String",
+ ],
"v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
# representation.
"v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
# [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
# Only the name of the final blob is kept.
- "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
- "A String",
- ],
},
"layerInfo": [ # This contains layer-specific metadata, if populated it has length
# "distance" and is ordered with [distance] being the layer immediately
@@ -4586,421 +5001,6 @@
# occurrence.
},
},
- "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
- # specified. This field can be used as a filter in list requests.
- "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
- "name": "A String", # Deprecated, do not use. Use uri instead.
- #
- # The name of the resource. For example, the name of a Docker image -
- # "Debian".
- "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
- #
- # The hash of the resource content. For example, the Docker digest.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- "uri": "A String", # Required. The unique URI of the resource. For example,
- # `https://gcr.io/project/image@sha256:foo` for a Docker image.
- },
- "name": "A String", # Output only. The name of the occurrence in the form of
- # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
- "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
- "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
- # attestation can be verified using the attached signature. If the verifier
- # trusts the public key of the signer, then verifying the signature is
- # sufficient to establish trust. In this circumstance, the authority to which
- # this attestation is attached is primarily useful for look-up (how to find
- # this attestation if you already know the authority and artifact to be
- # verified) and intent (which authority was this attestation intended to sign
- # for).
- "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
- # supports `ATTACHED` signatures, where the payload that is signed is included
- # alongside the signature itself in the same file.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
- # (GPG) or equivalent. Since this message only supports attached signatures,
- # the payload that was signed must be attached. While the signature format
- # supported is dependent on the verification implementation, currently only
- # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
- # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
- # --output=signature.gpg payload.json` will create the signature content
- # expected in this field in `signature.gpg` for the `payload.json`
- # attestation payload.
- "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
- # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
- # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
- # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
- # Implementations may choose to acknowledge "LONG", "SHORT", or other
- # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
- # In gpg, the full fingerprint can be retrieved from the `fpr` field
- # returned when calling --list-keys with --with-colons. For example:
- # ```
- # gpg --with-colons --with-fingerprint --force-v4-certs \
- # --list-keys attester@example.com
- # tru::1:1513631572:0:3:1:5
- # pub:...<SNIP>...
- # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
- # ```
- # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
- },
- "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
- # This attestation must define the `serialized_payload` that the `signatures`
- # verify and any metadata necessary to interpret that plaintext. The
- # signatures should always be over the `serialized_payload` bytestring.
- "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
- # should consider this attestation message verified if at least one
- # `signature` verifies `serialized_payload`. See `Signature` in common.proto
- # for more details on signature structure and verification.
- { # Verifiers (e.g. Kritis implementations) MUST verify signatures
- # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
- # Typically this means that the verifier has been configured with a map from
- # `public_key_id` to public key material (and any required parameters, e.g.
- # signing algorithm).
- #
- # In particular, verification implementations MUST NOT treat the signature
- # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
- # DOES NOT validate or authenticate a public key; it only provides a mechanism
- # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
- # a trusted channel. Verification implementations MUST reject signatures in any
- # of the following circumstances:
- # * The `public_key_id` is not recognized by the verifier.
- # * The public key that `public_key_id` refers to does not verify the
- # signature with respect to the payload.
- #
- # The `signature` contents SHOULD NOT be "attached" (where the payload is
- # included with the serialized `signature` bytes). Verifiers MUST ignore any
- # "attached" payload and only verify signatures with respect to explicitly
- # provided payload (e.g. a `payload` field on the proto message that holds
- # this Signature, or the canonical serialization of the proto message that
- # holds this signature).
- "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
- # * The `public_key_id` is required.
- # * The `public_key_id` MUST be an RFC3986 conformant URI.
- # * When possible, the `public_key_id` SHOULD be an immutable reference,
- # such as a cryptographic digest.
- #
- # Examples of valid `public_key_id`s:
- #
- # OpenPGP V4 public key fingerprint:
- # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
- # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
- # details on this scheme.
- #
- # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
- # serialization):
- # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
- # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
- "signature": "A String", # The content of the signature, an opaque bytestring.
- # The payload that this signature verifies MUST be unambiguously provided
- # with the Signature during verification. A wrapper message might provide
- # the payload explicitly. Alternatively, a message might have a canonical
- # serialization that can always be unambiguously computed to derive the
- # payload.
- },
- ],
- "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
- # The encoding and semantic meaning of this payload must match what is set in
- # `content_type`.
- "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
- # The verifier must ensure that the provided type is one that the verifier
- # supports, and that the attestation payload is a valid instantiation of that
- # type (for example by validating a JSON schema).
- },
- },
- },
- "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
- "longDescription": "A String", # Output only. A detailed description of this vulnerability.
- "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
- "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
- # available, and note provider assigned severity when distro has not yet
- # assigned a severity for this vulnerability.
- "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
- "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
- # scale of 0-10 where 0 indicates low severity and 10 indicates high
- # severity.
- "relatedUrls": [ # Output only. URLs related to this vulnerability.
- { # Metadata for any related URL information.
- "url": "A String", # Specific URL associated with the resource.
- "label": "A String", # Label to describe usage of the URL.
- },
- ],
- "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
- # packages etc)
- "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
- # within the associated resource.
- { # This message wraps a location affected by a vulnerability and its
- # associated fix (if one is available).
- "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- "severityName": "A String", # Deprecated, use Details.effective_severity instead
- # The severity (e.g., distro assigned severity) for this vulnerability.
- "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
- "package": "A String", # Required. The package being described.
- "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
- # format. Examples include distro or storage location for vulnerable jar.
- },
- },
- ],
- },
- "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
- "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
- # system.
- "location": [ # Required. All of the places within the filesystem versions of this package
- # have been found.
- { # An occurrence of a particular package installation found within a system's
- # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
- "version": { # Version contains structured information about the version of a package. # The version installed at this location.
- "name": "A String", # Required only when version kind is NORMAL. The main part of the version
- # name.
- "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
- # versions.
- "epoch": 42, # Used to correct mistakes in the version numbering scheme.
- "revision": "A String", # The iteration of the package build from the above version.
- },
- "path": "A String", # The path from which we gathered that this package/version is installed.
- "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
- # denoting the package manager version distributing a package.
- },
- ],
- "name": "A String", # Output only. The name of the installed package.
- },
- },
- "build": { # Details of a build occurrence. # Describes a verifiable build.
- "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
- # build signature in the corresponding build note. After verifying the
- # signature, `provenance_bytes` can be unmarshalled and compared to the
- # provenance to confirm that it is unchanged. A base64-encoded string
- # representation of the provenance bytes is used for the signature in order
- # to interoperate with openssl which expects this format for signature
- # verification.
- #
- # The serialized form is captured both to avoid ambiguity in how the
- # provenance is marshalled to json as well to prevent incompatibilities with
- # future changes.
- "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
- # details about the build from source to completion.
- "logsUri": "A String", # URI where any logs for this provenance were written.
- "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
- # user's e-mail address at the time the build was initiated; this address may
- # not represent the same end-user for all time.
- "builderVersion": "A String", # Version string of the builder at the time this build was executed.
- "commands": [ # Commands requested by the build.
- { # Command describes a step performed as part of the build pipeline.
- "name": "A String", # Required. Name of the command, as presented on the command line, or if the
- # command is packaged as a Docker container, as presented to `docker pull`.
- "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
- # this command as a dependency.
- "dir": "A String", # Working directory (relative to project source root) used when running this
- # command.
- "waitFor": [ # The ID(s) of the command(s) that this command depends on.
- "A String",
- ],
- "env": [ # Environment variables set before running this command.
- "A String",
- ],
- "args": [ # Command-line arguments used when executing this command.
- "A String",
- ],
- },
- ],
- "builtArtifacts": [ # Output of the build.
- { # Artifact describes a build product.
- "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
- # like `gcr.io/projectID/imagename@sha256:123456`.
- "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
- # the case of a container build, the name used to push the container image to
- # Google Container Registry, as presented to `docker push`. Note that a
- # single Artifact ID can have multiple names, for example if two tags are
- # applied to one image.
- "A String",
- ],
- "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
- # container.
- },
- ],
- "id": "A String", # Required. Unique identifier of the build.
- "buildOptions": { # Special options applied to this build. This is a catch-all field where
- # build providers can enter any desired additional details.
- "a_key": "A String",
- },
- "endTime": "A String", # Time at which execution of the build was finished.
- "startTime": "A String", # Time at which execution of the build was started.
- "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
- "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
- "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
- # location.
- "additionalContexts": [ # If provided, some of the source code used for the build may be found in
- # these locations, in the case where the source repository had multiple
- # remotes or submodules. This list will not include the context specified in
- # the context field.
- { # A SourceContext is a reference to a tree of files. A SourceContext together
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- ],
- "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
- # source integrity was maintained in the build.
- #
- # The keys to this map are file paths used as build source and the values
- # contain the hash values for those files.
- #
- # If the build source came in a single package such as a gzipped tarfile
- # (.tar.gz), the FileHash will be for the single path to that file.
- "a_key": { # Container message for hashes of byte content of files, used in source
- # messages to verify integrity of source input to the build.
- "fileHash": [ # Required. Collection of file hashes.
- { # Container message for hash values.
- "type": "A String", # Required. The type of hash that was performed.
- "value": "A String", # Required. The hash value.
- },
- ],
- },
- },
- "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
- # with a path point to a unique revision of a single file or directory.
- "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
- # Source Repo.
- "revisionId": "A String", # A revision ID.
- "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
- "uid": "A String", # A server-assigned, globally unique identifier.
- "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
- # winged-cargo-31) and a repo name within that project.
- "projectId": "A String", # The ID of the project.
- "repoName": "A String", # The name of the repo. Leave empty for the default repo.
- },
- },
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- },
- "labels": { # Labels with user defined metadata.
- "a_key": "A String",
- },
- "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
- # repository (e.g., GitHub).
- "revisionId": "A String", # Git commit hash.
- "url": "A String", # Git repository URL.
- },
- "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
- "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
- # "project/subproject" is a valid project name. The "repo name" is the
- # hostURI/project.
- "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
- "name": "A String", # The alias name.
- "kind": "A String", # The alias kind.
- },
- "hostUri": "A String", # The URI of a running Gerrit instance.
- "revisionId": "A String", # A revision (commit) ID.
- },
- },
- },
- "createTime": "A String", # Time at which the build was created.
- "projectId": "A String", # ID of the project.
- },
- },
- "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
- "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
- "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
- # details to show to the user. The LocalizedMessage is output only and
- # populated by the API.
- # different programming environments, including REST APIs and RPC APIs. It is
- # used by [gRPC](https://github.com/grpc). Each `Status` message contains
- # three pieces of data: error code, error message, and error details.
- #
- # You can find out more about this error model and how to work with it in the
- # [API Design Guide](https://cloud.google.com/apis/design/errors).
- "code": 42, # The status code, which should be an enum value of google.rpc.Code.
- "message": "A String", # A developer-facing error message, which should be in English. Any
- # user-facing error message should be localized and sent in the
- # google.rpc.Status.details field, or localized by the client.
- "details": [ # A list of messages that carry the error details. There is a common set of
- # message types for APIs to use.
- {
- "a_key": "", # Properties of the object. Contains field @type with type URL.
- },
- ],
- },
- "analysisStatus": "A String", # The status of discovery for the resource.
- "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
- "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
- # Deprecated, do not use.
- },
- },
- "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
- # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
- # used as a filter in list requests.
- "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
- "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
- "undeployTime": "A String", # End of the lifetime of this deployment.
- "platform": "A String", # Platform hosting this deployment.
- "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
- "address": "A String", # Address of the runtime element hosting this deployment.
- "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
- # the deployable field with the same name.
- "A String",
- ],
- "userEmail": "A String", # Identity of the user that triggered this deployment.
- "config": "A String", # Configuration used to create this deployment.
- },
- },
- "createTime": "A String", # Output only. The time this occurrence was created.
}</pre>
</div>
@@ -5092,6 +5092,18 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"version": 42, # Specifies the format of the policy.
#
# Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
@@ -5120,6 +5132,58 @@
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
+ "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
+ #
+ # If the condition evaluates to `true`, then this binding applies to the
+ # current request.
+ #
+ # If the condition evaluates to `false`, then this binding does not apply to
+ # the current request. However, a different role binding might grant the same
+ # role to one or more of the members in this binding.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
+ # are documented at https://github.com/google/cel-spec.
+ #
+ # Example (Comparison):
+ #
+ # title: "Summary size limit"
+ # description: "Determines if a summary is less than 100 chars"
+ # expression: "document.summary.size() < 100"
+ #
+ # Example (Equality):
+ #
+ # title: "Requestor is owner"
+ # description: "Determines if requestor is the document owner"
+ # expression: "document.owner == request.auth.claims.email"
+ #
+ # Example (Logic):
+ #
+ # title: "Public documents"
+ # description: "Determine whether the document should be publicly visible"
+ # expression: "document.type != 'private' && document.type != 'internal'"
+ #
+ # Example (Data Manipulation):
+ #
+ # title: "Notification string"
+ # description: "Create a notification string with a timestamp."
+ # expression: "'New message received at ' + string(document.create_time)"
+ #
+ # The exact variables and functions that may be referenced within an expression
+ # are determined by the service that evaluates it. See the service
+ # documentation for additional information.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "title": "A String", # Optional. Title for the expression, i.e. a short string describing
+ # its purpose. This can be used e.g. in UIs which allow to enter the
+ # expression.
+ "location": "A String", # Optional. String indicating the location of the expression for error
+ # reporting, e.g. a file name and a position in the file.
+ },
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
#
@@ -5167,72 +5231,8 @@
],
"role": "A String", # Role that is assigned to `members`.
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
- "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
- #
- # If the condition evaluates to `true`, then this binding applies to the
- # current request.
- #
- # If the condition evaluates to `false`, then this binding does not apply to
- # the current request. However, a different role binding might grant the same
- # role to one or more of the members in this binding.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM
- # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
- # are documented at https://github.com/google/cel-spec.
- #
- # Example (Comparison):
- #
- # title: "Summary size limit"
- # description: "Determines if a summary is less than 100 chars"
- # expression: "document.summary.size() < 100"
- #
- # Example (Equality):
- #
- # title: "Requestor is owner"
- # description: "Determines if requestor is the document owner"
- # expression: "document.owner == request.auth.claims.email"
- #
- # Example (Logic):
- #
- # title: "Public documents"
- # description: "Determine whether the document should be publicly visible"
- # expression: "document.type != 'private' && document.type != 'internal'"
- #
- # Example (Data Manipulation):
- #
- # title: "Notification string"
- # description: "Create a notification string with a timestamp."
- # expression: "'New message received at ' + string(document.create_time)"
- #
- # The exact variables and functions that may be referenced within an expression
- # are determined by the service that evaluates it. See the service
- # documentation for additional information.
- "title": "A String", # Optional. Title for the expression, i.e. a short string describing
- # its purpose. This can be used e.g. in UIs which allow to enter the
- # expression.
- "location": "A String", # Optional. String indicating the location of the expression for error
- # reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
- },
},
],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
},
}
@@ -5311,6 +5311,18 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"version": 42, # Specifies the format of the policy.
#
# Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
@@ -5339,6 +5351,58 @@
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
+ "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
+ #
+ # If the condition evaluates to `true`, then this binding applies to the
+ # current request.
+ #
+ # If the condition evaluates to `false`, then this binding does not apply to
+ # the current request. However, a different role binding might grant the same
+ # role to one or more of the members in this binding.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
+ # are documented at https://github.com/google/cel-spec.
+ #
+ # Example (Comparison):
+ #
+ # title: "Summary size limit"
+ # description: "Determines if a summary is less than 100 chars"
+ # expression: "document.summary.size() < 100"
+ #
+ # Example (Equality):
+ #
+ # title: "Requestor is owner"
+ # description: "Determines if requestor is the document owner"
+ # expression: "document.owner == request.auth.claims.email"
+ #
+ # Example (Logic):
+ #
+ # title: "Public documents"
+ # description: "Determine whether the document should be publicly visible"
+ # expression: "document.type != 'private' && document.type != 'internal'"
+ #
+ # Example (Data Manipulation):
+ #
+ # title: "Notification string"
+ # description: "Create a notification string with a timestamp."
+ # expression: "'New message received at ' + string(document.create_time)"
+ #
+ # The exact variables and functions that may be referenced within an expression
+ # are determined by the service that evaluates it. See the service
+ # documentation for additional information.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "title": "A String", # Optional. Title for the expression, i.e. a short string describing
+ # its purpose. This can be used e.g. in UIs which allow to enter the
+ # expression.
+ "location": "A String", # Optional. String indicating the location of the expression for error
+ # reporting, e.g. a file name and a position in the file.
+ },
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
#
@@ -5386,72 +5450,8 @@
],
"role": "A String", # Role that is assigned to `members`.
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
- "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
- #
- # If the condition evaluates to `true`, then this binding applies to the
- # current request.
- #
- # If the condition evaluates to `false`, then this binding does not apply to
- # the current request. However, a different role binding might grant the same
- # role to one or more of the members in this binding.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM
- # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
- # are documented at https://github.com/google/cel-spec.
- #
- # Example (Comparison):
- #
- # title: "Summary size limit"
- # description: "Determines if a summary is less than 100 chars"
- # expression: "document.summary.size() < 100"
- #
- # Example (Equality):
- #
- # title: "Requestor is owner"
- # description: "Determines if requestor is the document owner"
- # expression: "document.owner == request.auth.claims.email"
- #
- # Example (Logic):
- #
- # title: "Public documents"
- # description: "Determine whether the document should be publicly visible"
- # expression: "document.type != 'private' && document.type != 'internal'"
- #
- # Example (Data Manipulation):
- #
- # title: "Notification string"
- # description: "Create a notification string with a timestamp."
- # expression: "'New message received at ' + string(document.create_time)"
- #
- # The exact variables and functions that may be referenced within an expression
- # are determined by the service that evaluates it. See the service
- # documentation for additional information.
- "title": "A String", # Optional. Title for the expression, i.e. a short string describing
- # its purpose. This can be used e.g. in UIs which allow to enter the
- # expression.
- "location": "A String", # Optional. String indicating the location of the expression for error
- # reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
- },
},
],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
}</pre>
</div>