docs: update docs/dyn (#1096)

This PR was generated using Autosynth. :rainbow:

Synth log will be available here:
https://source.cloud.google.com/results/invocations/6f0f288a-a1e8-4b2d-a85f-00b1c6150185/targets

- [ ] To automatically regenerate this PR, check this box.

Source-Link: https://github.com/googleapis/synthtool/commit/39b7149da4026765385403632db3c6f63db96b2c
Source-Link: https://github.com/googleapis/synthtool/commit/9a7d9fbb7045c34c9d3d22c1ff766eeae51f04c9
Source-Link: https://github.com/googleapis/synthtool/commit/dc9903a8c30c3662b6098f0e4a97f221d67268b2
Source-Link: https://github.com/googleapis/synthtool/commit/7fcc405a579d5d53a726ff3da1b7c8c08f0f2d58
Source-Link: https://github.com/googleapis/synthtool/commit/d5fc0bcf9ea9789c5b0e3154a9e3b29e5cea6116
Source-Link: https://github.com/googleapis/synthtool/commit/e89175cf074dccc4babb4eca66ae913696e47a71
Source-Link: https://github.com/googleapis/synthtool/commit/7d652819519dfa24da9e14548232e4aaba71a11c
Source-Link: https://github.com/googleapis/synthtool/commit/7db8a6c5ffb12a6e4c2f799c18f00f7f3d60e279
Source-Link: https://github.com/googleapis/synthtool/commit/1f1148d3c7a7a52f0c98077f976bd9b3c948ee2b
Source-Link: https://github.com/googleapis/synthtool/commit/2c8aecedd55b0480fb4e123b6e07fa5b12953862
Source-Link: https://github.com/googleapis/synthtool/commit/3d3e94c4e02370f307a9a200b0c743c3d8d19f29
Source-Link: https://github.com/googleapis/synthtool/commit/c7824ea48ff6d4d42dfae0849aec8a85acd90bd9
Source-Link: https://github.com/googleapis/synthtool/commit/ba9918cd22874245b55734f57470c719b577e591
Source-Link: https://github.com/googleapis/synthtool/commit/b19b401571e77192f8dd38eab5fb2300a0de9324
Source-Link: https://github.com/googleapis/synthtool/commit/6542bd723403513626f61642fc02ddca528409aa
diff --git a/docs/dyn/containeranalysis_v1alpha1.projects.notes.html b/docs/dyn/containeranalysis_v1alpha1.projects.notes.html
index fda9acc..20ee203 100644
--- a/docs/dyn/containeranalysis_v1alpha1.projects.notes.html
+++ b/docs/dyn/containeranalysis_v1alpha1.projects.notes.html
@@ -83,7 +83,7 @@
   <code><a href="#close">close()</a></code></p>
 <p class="firstline">Close httplib2 connections.</p>
 <p class="toc_element">
-  <code><a href="#create">create(parent, body=None, name=None, noteId=None, x__xgafv=None)</a></code></p>
+  <code><a href="#create">create(parent, body=None, noteId=None, name=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Creates a new `Note`.</p>
 <p class="toc_element">
   <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
@@ -95,7 +95,7 @@
   <code><a href="#getIamPolicy">getIamPolicy(resource, body=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Gets the access control policy for a note or an `Occurrence` resource. Requires `containeranalysis.notes.setIamPolicy` or `containeranalysis.occurrences.setIamPolicy` permission if the resource is a note or occurrence, respectively. Attempting to call this method on a resource without the required permission will result in a `PERMISSION_DENIED` error. Attempting to call this method on a non-existent resource will result in a `NOT_FOUND` error if the user has list permission on the project, or a `PERMISSION_DENIED` error otherwise. The resource takes the following formats: `projects/{PROJECT_ID}/occurrences/{OCCURRENCE_ID}` for occurrences and projects/{PROJECT_ID}/notes/{NOTE_ID} for notes</p>
 <p class="toc_element">
-  <code><a href="#list">list(parent, filter=None, name=None, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p>
+  <code><a href="#list">list(parent, pageToken=None, filter=None, pageSize=None, name=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Lists all `Notes` for a given project.</p>
 <p class="toc_element">
   <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
@@ -116,7 +116,7 @@
 </div>
 
 <div class="method">
-    <code class="details" id="create">create(parent, body=None, name=None, noteId=None, x__xgafv=None)</code>
+    <code class="details" id="create">create(parent, body=None, noteId=None, name=None, x__xgafv=None)</code>
   <pre>Creates a new `Note`.
 
 Args:
@@ -125,128 +125,128 @@
     The object takes the form of:
 
 { # Provides a detailed description of a `Note`.
-    &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-      &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-        &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-        &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-          &quot;A String&quot;,
-        ],
+    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+      &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+        { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+            &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+          },
+        },
+      ],
+    },
+    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+    &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+      &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+        &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+        &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+        &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
       },
-      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+      &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+        { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+          &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+            &quot;A String&quot;,
+          ],
+          &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+        },
+      ],
+      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+    },
+    &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
     },
     &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-    &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+    &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
     &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
       &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
         &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
       },
     },
+    &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+        { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+        },
+      ],
+      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+    },
+    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+    &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+      &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+        &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+        &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+          &quot;A String&quot;,
+        ],
+        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+      },
+      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+    },
     &quot;relatedUrl&quot;: [ # URLs associated with this note
       { # Metadata for any related URL information
         &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
         &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
       },
     ],
-    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-    },
-    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-    &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-        { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-        },
-      ],
-      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-    },
-    &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
     &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
       &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
         &quot;A String&quot;,
       ],
     },
-    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-      &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-        { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-            &quot;package&quot;: &quot;A String&quot;, # The package being described.
-          },
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-        },
-      ],
-      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-    },
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
     &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-    &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-      &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-        { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-          &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-          &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-            &quot;A String&quot;,
-          ],
-        },
-      ],
-      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-      &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-        &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-        &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-      },
-    },
     &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
       &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
       &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-        &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
         &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
         &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+        &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
       },
     },
   }
 
-  name: string, The name of the project. Should be of the form &quot;providers/{provider_id}&quot;. @Deprecated
   noteId: string, The ID to use for this note.
+  name: string, The name of the project. Should be of the form &quot;providers/{provider_id}&quot;. @Deprecated
   x__xgafv: string, V1 error format.
     Allowed values
       1 - v1 error format
@@ -256,122 +256,122 @@
   An object of the form:
 
     { # Provides a detailed description of a `Note`.
-      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-            &quot;A String&quot;,
-          ],
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              },
+            },
+          },
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
         },
-        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+          },
+        ],
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+      },
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
       },
       &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
       &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
         &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
           &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
         },
       },
+      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+          },
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+            &quot;A String&quot;,
+          ],
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+        },
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+      },
       &quot;relatedUrl&quot;: [ # URLs associated with this note
         { # Metadata for any related URL information
           &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
           &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-      },
-      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-          },
-        ],
-        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      },
-      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
         &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
           &quot;A String&quot;,
         ],
       },
-      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              },
-              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-              &quot;package&quot;: &quot;A String&quot;, # The package being described.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          },
-        ],
-        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-              &quot;A String&quot;,
-            ],
-          },
-        ],
-        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        },
-      },
       &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
         &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
         &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
           &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
           &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
         },
       },
     }</pre>
@@ -410,122 +410,122 @@
   An object of the form:
 
     { # Provides a detailed description of a `Note`.
-      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-            &quot;A String&quot;,
-          ],
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              },
+            },
+          },
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
         },
-        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+          },
+        ],
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+      },
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
       },
       &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
       &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
         &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
           &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
         },
       },
+      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+          },
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+            &quot;A String&quot;,
+          ],
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+        },
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+      },
       &quot;relatedUrl&quot;: [ # URLs associated with this note
         { # Metadata for any related URL information
           &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
           &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-      },
-      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-          },
-        ],
-        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      },
-      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
         &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
           &quot;A String&quot;,
         ],
       },
-      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              },
-              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-              &quot;package&quot;: &quot;A String&quot;, # The package being described.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          },
-        ],
-        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-              &quot;A String&quot;,
-            ],
-          },
-        ],
-        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        },
-      },
       &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
         &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
         &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
           &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
           &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
         },
       },
     }</pre>
@@ -560,15 +560,14 @@
       { # Associates `members` with a `role`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: &quot;Summary size limit&quot; description: &quot;Determines if a summary is less than 100 chars&quot; expression: &quot;document.summary.size() &lt; 100&quot; Example (Equality): title: &quot;Requestor is owner&quot; description: &quot;Determines if requestor is the document owner&quot; expression: &quot;document.owner == request.auth.claims.email&quot; Example (Logic): title: &quot;Public documents&quot; description: &quot;Determine whether the document should be publicly visible&quot; expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot; Example (Data Manipulation): title: &quot;Notification string&quot; description: &quot;Create a notification string with a timestamp.&quot; expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot; The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information. # The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
           &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`.
           &quot;A String&quot;,
         ],
         &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
-        &quot;bindingId&quot;: &quot;A String&quot;,
       },
     ],
     &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the `etag` in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An `etag` is returned in the response to `getIamPolicy`, and systems are expected to put that etag in the request to `setIamPolicy` to ensure that their change will be applied to the same version of the policy. **Important:** If you use IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1` policy, and all of the conditions in the version `3` policy are lost.
@@ -576,15 +575,15 @@
 </div>
 
 <div class="method">
-    <code class="details" id="list">list(parent, filter=None, name=None, pageToken=None, pageSize=None, x__xgafv=None)</code>
+    <code class="details" id="list">list(parent, pageToken=None, filter=None, pageSize=None, name=None, x__xgafv=None)</code>
   <pre>Lists all `Notes` for a given project.
 
 Args:
   parent: string, This field contains the project Id for example: &quot;projects/{PROJECT_ID}&quot;. (required)
-  filter: string, The filter expression.
-  name: string, The name field will contain the project Id for example: &quot;providers/{provider_id} @Deprecated
   pageToken: string, Token to provide to skip to a particular spot in the list.
+  filter: string, The filter expression.
   pageSize: integer, Number of notes to return in the list.
+  name: string, The name field will contain the project Id for example: &quot;providers/{provider_id} @Deprecated
   x__xgafv: string, V1 error format.
     Allowed values
       1 - v1 error format
@@ -596,122 +595,122 @@
     { # Response including listed notes.
     &quot;notes&quot;: [ # The occurrences requested
       { # Provides a detailed description of a `Note`.
-          &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-            &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-              &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-              &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-              &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-                &quot;A String&quot;,
-              ],
+          &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+            &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+            &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+            &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+              { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+                &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+                &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                },
+                &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+                &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+                &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                },
+                &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+                &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+                &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+                  &quot;package&quot;: &quot;A String&quot;, # The package being described.
+                  &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+                  &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+                    &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                    &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                    &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                    &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                  },
+                },
+              },
+            ],
+          },
+          &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+          &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
             },
-            &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+            &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+              { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+                &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+                &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+                  &quot;A String&quot;,
+                ],
+                &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+                &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+              },
+            ],
+            &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+          },
+          &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+          &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+            &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
           },
           &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-          &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+          &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
           &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
             &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
               &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
             },
           },
+          &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+            &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+              { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+                &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+                &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                },
+                &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+                &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+                &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+              },
+            ],
+            &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+          },
+          &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+          &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+            &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+              &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+              &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+                &quot;A String&quot;,
+              ],
+              &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+            },
+            &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+          },
           &quot;relatedUrl&quot;: [ # URLs associated with this note
             { # Metadata for any related URL information
               &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
               &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
             },
           ],
-          &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-            &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-          },
-          &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-          &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-            &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-              { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-                &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-                &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-                &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-                &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-                &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                },
-              },
-            ],
-            &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-          },
-          &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-          &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
           &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
             &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
               &quot;A String&quot;,
             ],
           },
-          &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-            &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-              { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-                &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-                &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-                  &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-                    &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                    &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                    &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                    &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                  },
-                  &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-                  &quot;package&quot;: &quot;A String&quot;, # The package being described.
-                },
-                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-                &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                },
-                &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-                &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                },
-                &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-                &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-                &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-              },
-            ],
-            &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-            &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-          },
+          &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
           &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-          &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-          &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-            &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-              { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-                &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-                &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-                &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-                &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-                  &quot;A String&quot;,
-                ],
-              },
-            ],
-            &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-          },
           &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
             &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
             &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-              &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-              &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
               &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
               &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+              &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+              &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
             },
           },
         },
@@ -744,122 +743,122 @@
     The object takes the form of:
 
 { # Provides a detailed description of a `Note`.
-    &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-      &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-        &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-        &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-          &quot;A String&quot;,
-        ],
+    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+      &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+        { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+            &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+          },
+        },
+      ],
+    },
+    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+    &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+      &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+        &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+        &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+        &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
       },
-      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+      &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+        { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+          &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+            &quot;A String&quot;,
+          ],
+          &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+        },
+      ],
+      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+    },
+    &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
     },
     &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-    &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+    &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
     &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
       &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
         &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
       },
     },
+    &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+        { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+        },
+      ],
+      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+    },
+    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+    &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+      &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+        &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+        &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+          &quot;A String&quot;,
+        ],
+        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+      },
+      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+    },
     &quot;relatedUrl&quot;: [ # URLs associated with this note
       { # Metadata for any related URL information
         &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
         &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
       },
     ],
-    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-    },
-    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-    &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-        { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-        },
-      ],
-      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-    },
-    &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
     &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
       &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
         &quot;A String&quot;,
       ],
     },
-    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-      &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-        { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-            &quot;package&quot;: &quot;A String&quot;, # The package being described.
-          },
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          },
-          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-        },
-      ],
-      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-    },
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
     &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-    &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-      &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-        { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-          &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-          &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-            &quot;A String&quot;,
-          ],
-        },
-      ],
-      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-      &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-        &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-        &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-      },
-    },
     &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
       &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
       &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-        &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
         &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
         &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+        &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
       },
     },
   }
@@ -874,122 +873,122 @@
   An object of the form:
 
     { # Provides a detailed description of a `Note`.
-      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
-        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
-          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
-          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-            &quot;A String&quot;,
-          ],
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              },
+            },
+          },
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
         },
-        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+          },
+        ],
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+      },
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
       },
       &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This field can be used as a filter in list requests.
-      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
       &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;. For example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and one for &quot;build&quot;. This Note is intended to act strictly as a grouping mechanism for the attached Occurrences (Attestations). This grouping mechanism also provides a security boundary, since IAM ACLs gate the ability for a principle to attach an Occurrence to a given Note. It also provides a single point of lookup to find all attached Attestation Occurrences, even if they don&#x27;t all live in the same project. # A note describing an attestation role.
         &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the AttestationAuthority. Because the name of a Note acts as its resource reference, it is important to disambiguate the canonical name of the Note (which might be a UUID for security purposes) from &quot;readable&quot; names more suitable for debug output. Note that these hints should NOT be used to look up AttestationAuthorities in security sensitive contexts, such as when looking up Attestations to verify.
           &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
         },
       },
+      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
+          },
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage relationship. Linked occurrences are derived from this or an equivalent image via: FROM Or an equivalent reference, e.g. a tag of the resource_url. # A note describing a base image.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1 representation. This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+            &quot;A String&quot;,
+          ],
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept. This field can be used as a filter in list requests.
+        },
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of associated occurrence images.
+      },
       &quot;relatedUrl&quot;: [ # URLs associated with this note
         { # Metadata for any related URL information
           &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
           &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note exists in a provider&#x27;s project. A `Discovery` occurrence is created in a consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will indicate the status of the analysis. Absence of an occurrence linked to this note for a resource indicates that analysis hasn&#x27;t started. # A note describing a provider/analysis type.
-        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-      },
-      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-      &quot;package&quot;: { # This represents a particular package that is distributed over various channels. e.g. glibc (aka libc6) is distributed by many, at various versions. # A note describing a package hosted by various package managers.
-        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-          { # This represents a particular channel of distribution for a given package. e.g. Debian&#x27;s jessie-backports dpkg mirror
-            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution channel were built
-            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
-            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The latest available version of this package in this distribution channel.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-          },
-        ],
-        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      },
-      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
         &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
           &quot;A String&quot;,
         ],
       },
-      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-        &quot;details&quot;: [ # All information about the package to specifically identify this vulnerability. One entry per (version range and cpe_uri) the package vulnerability has manifested in.
-          { # Identifies all occurrences of this vulnerability in the package for a specific distro/location For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to obsolete details.
-            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-              &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The version of the package being described. This field can be used as a filter in list requests.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              },
-              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) format. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-              &quot;package&quot;: &quot;A String&quot;, # The package being described.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability manifests. Examples include distro or storage location for vulnerable jar. This field can be used as a filter in list requests.
-            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The min version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found. This field can be used as a filter in list requests.
-            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # The max version of the package in which the vulnerability exists.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            },
-            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems, node.js packages etc)
-            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          },
-        ],
-        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
       &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as a filter in list requests.
-      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given version. For each package version combination (i.e. bash 4.0, bash 4.1, bash 4.1.2), there will be a Upgrade Note. # A note describing an upgrade.
-        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-          { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities.
-            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed.
-            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
-            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-              &quot;A String&quot;,
-            ],
-          },
-        ],
-        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-        &quot;version&quot;: { # Version contains structured information about the version of the package. For a discussion of this in Debian/Ubuntu: http://serverfault.com/questions/604541/debian-packages-version-convention For a discussion of this in Redhat/Fedora/Centos: http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/ # Required - The version of the package in machine + human readable form.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions. If kind is not NORMAL, then the other fields are ignored.
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        },
-      },
       &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of the provenance message in linked BuildDetails. # Build provenance type for a verifiable build.
         &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
         &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this `BuilderDetails`.
-          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
           &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
           &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key stored in `public_key` (such as the Id or fingerprint for a PGP key, or the CN for a cert), or a reference to an external key (such as a reference to a key in Cloud Key Management Service).
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related findings are valid and unchanged. If `key_type` is empty, this defaults to PEM encoded public keys. This field may be empty if `key_id` references an external key. For Cloud Build based signatures, this is a PEM encoded public key. To verify the Cloud Build signature, place the contents of this field into a file (public.pem). The signature field is base64-decoded into its binary representation in signature.bin, and the provenance bytes from `BuildDetails` are base64-decoded into a binary representation in signed.bin. OpenSSL can then verify the signature: `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in `key_id`
         },
       },
     }</pre>
@@ -1011,15 +1010,14 @@
         { # Associates `members` with a `role`.
           &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: &quot;Summary size limit&quot; description: &quot;Determines if a summary is less than 100 chars&quot; expression: &quot;document.summary.size() &lt; 100&quot; Example (Equality): title: &quot;Requestor is owner&quot; description: &quot;Determines if requestor is the document owner&quot; expression: &quot;document.owner == request.auth.claims.email&quot; Example (Logic): title: &quot;Public documents&quot; description: &quot;Determine whether the document should be publicly visible&quot; expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot; Example (Data Manipulation): title: &quot;Notification string&quot; description: &quot;Create a notification string with a timestamp.&quot; expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot; The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information. # The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
             &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
-            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
             &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
             &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
+            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
           },
           &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`.
             &quot;A String&quot;,
           ],
           &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
-          &quot;bindingId&quot;: &quot;A String&quot;,
         },
       ],
       &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the `etag` in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An `etag` is returned in the response to `getIamPolicy`, and systems are expected to put that etag in the request to `setIamPolicy` to ensure that their change will be applied to the same version of the policy. **Important:** If you use IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1` policy, and all of the conditions in the version `3` policy are lost.
@@ -1040,15 +1038,14 @@
       { # Associates `members` with a `role`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: &quot;Summary size limit&quot; description: &quot;Determines if a summary is less than 100 chars&quot; expression: &quot;document.summary.size() &lt; 100&quot; Example (Equality): title: &quot;Requestor is owner&quot; description: &quot;Determines if requestor is the document owner&quot; expression: &quot;document.owner == request.auth.claims.email&quot; Example (Logic): title: &quot;Public documents&quot; description: &quot;Determine whether the document should be publicly visible&quot; expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot; Example (Data Manipulation): title: &quot;Notification string&quot; description: &quot;Create a notification string with a timestamp.&quot; expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot; The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information. # The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
           &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`.
           &quot;A String&quot;,
         ],
         &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
-        &quot;bindingId&quot;: &quot;A String&quot;,
       },
     ],
     &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the `etag` in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An `etag` is returned in the response to `getIamPolicy`, and systems are expected to put that etag in the request to `setIamPolicy` to ensure that their change will be applied to the same version of the policy. **Important:** If you use IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1` policy, and all of the conditions in the version `3` policy are lost.