docs: update generated docs (#981)

diff --git a/docs/dyn/containeranalysis_v1alpha1.providers.notes.html b/docs/dyn/containeranalysis_v1alpha1.providers.notes.html
index 5c53f02..034717b 100644
--- a/docs/dyn/containeranalysis_v1alpha1.providers.notes.html
+++ b/docs/dyn/containeranalysis_v1alpha1.providers.notes.html
@@ -80,7 +80,7 @@
 <p class="firstline">Returns the occurrences Resource.</p>
 
 <p class="toc_element">
-  <code><a href="#create">create(name, body=None, parent=None, noteId=None, x__xgafv=None)</a></code></p>
+  <code><a href="#create">create(name, body=None, noteId=None, parent=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Creates a new `Note`.</p>
 <p class="toc_element">
   <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
@@ -92,7 +92,7 @@
   <code><a href="#getIamPolicy">getIamPolicy(resource, body=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Gets the access control policy for a note or an `Occurrence` resource.</p>
 <p class="toc_element">
-  <code><a href="#list">list(name, pageToken=None, pageSize=None, parent=None, filter=None, x__xgafv=None)</a></code></p>
+  <code><a href="#list">list(name, pageToken=None, pageSize=None, filter=None, parent=None, x__xgafv=None)</a></code></p>
 <p class="firstline">Lists all `Notes` for a given project.</p>
 <p class="toc_element">
   <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
@@ -108,7 +108,7 @@
 <p class="firstline">Returns the permissions that a caller has on the specified note or</p>
 <h3>Method Details</h3>
 <div class="method">
-    <code class="details" id="create">create(name, body=None, parent=None, noteId=None, x__xgafv=None)</code>
+    <code class="details" id="create">create(name, body=None, noteId=None, parent=None, x__xgafv=None)</code>
   <pre>Creates a new `Note`.
 
 Args:
@@ -119,241 +119,41 @@
     The object takes the form of:
 
 { # Provides a detailed description of a `Note`.
-  &quot;relatedUrl&quot;: [ # URLs associated with this note
-    { # Metadata for any related URL information
-      &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
-      &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
-    },
-  ],
-  &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
-  &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
-      # relationship.  Linked occurrences are derived from this or an
-      # equivalent image via:
-      #   FROM &lt;Basis.resource_url&gt;
-      # Or an equivalent reference, e.g. a tag of the resource_url.
-    &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-      &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-        &quot;A String&quot;,
-      ],
-      &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
-          # representation.
-          # This field can be used as a filter in list requests.
-      &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-          #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-          # Only the name of the final blob is kept.
-          # This field can be used as a filter in list requests.
-    },
-    &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-        # associated occurrence images.
-  },
-  &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-      # field can be used as a filter in list requests.
-  &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
-      # the provenance message in linked BuildDetails.
-    &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
-        # `BuilderDetails`.
-      &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
-          # findings are valid and unchanged. If `key_type` is empty, this defaults
-          # to PEM encoded public keys.
-          #
-          # This field may be empty if `key_id` references an external key.
-          #
-          # For Cloud Build based signatures, this is a PEM encoded public
-          # key. To verify the Cloud Build signature, place the contents of
-          # this field into a file (public.pem). The signature field is base64-decoded
-          # into its binary representation in signature.bin, and the provenance bytes
-          # from `BuildDetails` are base64-decoded into a binary representation in
-          # signed.bin. OpenSSL can then verify the signature:
-          # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-      &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-          # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-          # CN for a cert), or a reference to an external key (such as a reference to a
-          # key in Cloud Key Management Service).
-      &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-          # `key_id`
-      &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
-    },
-    &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
-  },
-  &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-  &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
-    &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
-      &quot;A String&quot;,
-    ],
-  },
-  &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-  &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
-      # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
-      # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
-      # mechanism for the attached Occurrences (Attestations).  This grouping
-      # mechanism also provides a security boundary, since IAM ACLs gate the ability
-      # for a principle to attach an Occurrence to a given Note.  It also provides a
-      # single point of lookup to find all attached Attestation Occurrences, even if
-      # they don&#x27;t all live in the same project.
-    &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
-        # AttestationAuthority.  Because the name of a Note acts as its resource
-        # reference, it is important to disambiguate the canonical name of the Note
-        # (which might be a UUID for security purposes) from &quot;readable&quot; names more
-        # suitable for debug output.  Note that these hints should NOT be used to
-        # look up AttestationAuthorities in security sensitive contexts, such as when
-        # looking up Attestations to verify.
-      &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
-    },
-  },
-  &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-      # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-  &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-    &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-    &quot;details&quot;: [ # All information about the package to specifically identify this
-        # vulnerability. One entry per (version range and cpe_uri) the
-        # package vulnerability has manifested in.
-      { # Identifies all occurrences of this vulnerability in the package for a
-          # specific distro/location
-          # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-        &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-          &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-              # filter in list requests.
+    &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+        # various channels.
+        # e.g. glibc (aka libc6) is distributed by many, at various versions.
+      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+        { # This represents a particular channel of distribution for a given package.
+            # e.g. Debian&#x27;s jessie-backports dpkg mirror
+          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+              # this distribution channel.
               # For a discussion of this in Debian/Ubuntu:
               # http://serverfault.com/questions/604541/debian-packages-version-convention
               # For a discussion of this in Redhat/Fedora/Centos:
               # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
             &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
             &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
                 # If kind is not NORMAL, then the other fields are ignored.
             &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
           },
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-              # format. Examples include distro or storage location for vulnerable jar.
-              # This field can be used as a filter in list requests.
-          &quot;package&quot;: &quot;A String&quot;, # The package being described.
+          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+              # channel were built
+          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+              # denoting the package manager version distributing a package.
+          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
         },
-        &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-            # node.js packages etc)
-        &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-            # which the vulnerability manifests.  Examples include distro or storage
-            # location for vulnerable jar.
-            # This field can be used as a filter in list requests.
-        &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-        &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-        &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-            # This field can be used as a filter in list requests.
-        &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-            # obsolete details.
-      },
-    ],
-    &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-  },
-  &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
-      # version. For each package version combination (i.e. bash 4.0, bash 4.1,
-      # bash 4.1.2), there will be a Upgrade Note.
-    &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
-        # For a discussion of this in Debian/Ubuntu:
-        # http://serverfault.com/questions/604541/debian-packages-version-convention
-        # For a discussion of this in Redhat/Fedora/Centos:
-        # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-      &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-      &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-          # If kind is not NORMAL, then the other fields are ignored.
-      &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-      &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+      ],
+      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
     },
-    &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-      { # The Upgrade Distribution represents metadata about the Upgrade for each
-          # operating system (CPE). Some distributions have additional metadata around
-          # updates, classifying them into various categories and severities.
-        &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
-            # upstream operating system upgrade feed.
-        &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-        &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
-            # https://cpe.mitre.org/specification/.
-        &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-          &quot;A String&quot;,
-        ],
-      },
-    ],
-    &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-  },
-  &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-      # various channels.
-      # e.g. glibc (aka libc6) is distributed by many, at various versions.
-    &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-    &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-      { # This represents a particular channel of distribution for a given package.
-          # e.g. Debian&#x27;s jessie-backports dpkg mirror
-        &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-            # this distribution channel.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-        &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-            # denoting the package manager version distributing a package.
-        &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-        &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-            # channel were built
-        &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-      },
-    ],
-  },
-  &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-      # filter in list requests.
-  &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-      # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-      # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-      # indicate the status of the analysis. Absence of an occurrence linked to this
-      # note for a resource indicates that analysis hasn&#x27;t started.
-    &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-  },
-  &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-      # a filter in list requests.
-}
-
-  parent: string, This field contains the project Id for example:
-&quot;projects/{project_id}
-  noteId: string, The ID to use for this note.
-  x__xgafv: string, V1 error format.
-    Allowed values
-      1 - v1 error format
-      2 - v2 error format
-
-Returns:
-  An object of the form:
-
-    { # Provides a detailed description of a `Note`.
+    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+        # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
     &quot;relatedUrl&quot;: [ # URLs associated with this note
       { # Metadata for any related URL information
-        &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+        &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
       },
     ],
     &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
@@ -362,27 +162,98 @@
         # equivalent image via:
         #   FROM &lt;Basis.resource_url&gt;
         # Or an equivalent reference, e.g. a tag of the resource_url.
+      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+          # associated occurrence images.
       &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+            #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+            # Only the name of the final blob is kept.
+            # This field can be used as a filter in list requests.
         &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
           &quot;A String&quot;,
         ],
         &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
             # representation.
             # This field can be used as a filter in list requests.
-        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-            #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-            # Only the name of the final blob is kept.
-            # This field can be used as a filter in list requests.
       },
-      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-          # associated occurrence images.
     },
-    &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-        # field can be used as a filter in list requests.
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+        # filter in list requests.
+    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+      &quot;details&quot;: [ # All information about the package to specifically identify this
+          # vulnerability. One entry per (version range and cpe_uri) the
+          # package vulnerability has manifested in.
+        { # Identifies all occurrences of this vulnerability in the package for a
+            # specific distro/location
+            # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+              # obsolete details.
+          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+              # For a discussion of this in Debian/Ubuntu:
+              # http://serverfault.com/questions/604541/debian-packages-version-convention
+              # For a discussion of this in Redhat/Fedora/Centos:
+              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                # If kind is not NORMAL, then the other fields are ignored.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          },
+          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+              # For a discussion of this in Debian/Ubuntu:
+              # http://serverfault.com/questions/604541/debian-packages-version-convention
+              # For a discussion of this in Redhat/Fedora/Centos:
+              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                # If kind is not NORMAL, then the other fields are ignored.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          },
+          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+              # node.js packages etc)
+          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                # filter in list requests.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                # format. Examples include distro or storage location for vulnerable jar.
+                # This field can be used as a filter in list requests.
+            &quot;package&quot;: &quot;A String&quot;, # The package being described.
+          },
+          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+              # This field can be used as a filter in list requests.
+          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+              # which the vulnerability manifests.  Examples include distro or storage
+              # location for vulnerable jar.
+              # This field can be used as a filter in list requests.
+        },
+      ],
+      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+    },
     &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
         # the provenance message in linked BuildDetails.
       &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
           # `BuilderDetails`.
+        &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+            # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+            # CN for a cert), or a reference to an external key (such as a reference to a
+            # key in Cloud Key Management Service).
+        &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+            # `key_id`
         &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
             # findings are valid and unchanged. If `key_type` is empty, this defaults
             # to PEM encoded public keys.
@@ -396,23 +267,27 @@
             # from `BuildDetails` are base64-decoded into a binary representation in
             # signed.bin. OpenSSL can then verify the signature:
             # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-        &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-            # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-            # CN for a cert), or a reference to an external key (such as a reference to a
-            # key in Cloud Key Management Service).
-        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-            # `key_id`
-        &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
       },
       &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
     },
+    &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+        # field can be used as a filter in list requests.
     &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
     &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
       &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
         &quot;A String&quot;,
       ],
     },
+    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+        # a filter in list requests.
     &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+        # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+        # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+        # indicate the status of the analysis. Absence of an occurrence linked to this
+        # note for a resource indicates that analysis hasn&#x27;t started.
+      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+    },
     &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
         # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
         # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
@@ -431,85 +306,20 @@
         &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
       },
     },
-    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-        # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-      &quot;details&quot;: [ # All information about the package to specifically identify this
-          # vulnerability. One entry per (version range and cpe_uri) the
-          # package vulnerability has manifested in.
-        { # Identifies all occurrences of this vulnerability in the package for a
-            # specific distro/location
-            # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-                # filter in list requests.
-                # For a discussion of this in Debian/Ubuntu:
-                # http://serverfault.com/questions/604541/debian-packages-version-convention
-                # For a discussion of this in Redhat/Fedora/Centos:
-                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                  # If kind is not NORMAL, then the other fields are ignored.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-                # format. Examples include distro or storage location for vulnerable jar.
-                # This field can be used as a filter in list requests.
-            &quot;package&quot;: &quot;A String&quot;, # The package being described.
-          },
-          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-              # node.js packages etc)
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-              # which the vulnerability manifests.  Examples include distro or storage
-              # location for vulnerable jar.
-              # This field can be used as a filter in list requests.
-          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-              # This field can be used as a filter in list requests.
-          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-              # obsolete details.
-        },
-      ],
-      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-    },
     &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
         # version. For each package version combination (i.e. bash 4.0, bash 4.1,
         # bash 4.1.2), there will be a Upgrade Note.
+      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
       &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
           # For a discussion of this in Debian/Ubuntu:
           # http://serverfault.com/questions/604541/debian-packages-version-convention
           # For a discussion of this in Redhat/Fedora/Centos:
           # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
         &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
         &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
             # If kind is not NORMAL, then the other fields are ignored.
         &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
       },
       &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
         { # The Upgrade Distribution represents metadata about the Upgrade for each
@@ -517,57 +327,247 @@
             # updates, classifying them into various categories and severities.
           &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
               # upstream operating system upgrade feed.
-          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
           &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
               # https://cpe.mitre.org/specification/.
+          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
           &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
             &quot;A String&quot;,
           ],
         },
       ],
-      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
     },
-    &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-        # various channels.
-        # e.g. glibc (aka libc6) is distributed by many, at various versions.
-      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-        { # This represents a particular channel of distribution for a given package.
-            # e.g. Debian&#x27;s jessie-backports dpkg mirror
-          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-              # this distribution channel.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+  }
+
+  noteId: string, The ID to use for this note.
+  parent: string, This field contains the project Id for example:
+&quot;projects/{project_id}
+  x__xgafv: string, V1 error format.
+    Allowed values
+      1 - v1 error format
+      2 - v2 error format
+
+Returns:
+  An object of the form:
+
+    { # Provides a detailed description of a `Note`.
+      &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+          # various channels.
+          # e.g. glibc (aka libc6) is distributed by many, at various versions.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package.
+              # e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+                # this distribution channel.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+                # channel were built
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+                # denoting the package manager version distributing a package.
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
           },
-          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-              # denoting the package manager version distributing a package.
-          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-              # channel were built
-          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+          # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;relatedUrl&quot;: [ # URLs associated with this note
+        { # Metadata for any related URL information
+          &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+          &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-        # filter in list requests.
-    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-        # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-        # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-        # indicate the status of the analysis. Absence of an occurrence linked to this
-        # note for a resource indicates that analysis hasn&#x27;t started.
-      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-    },
-    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-        # a filter in list requests.
-  }</pre>
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
+          # relationship.  Linked occurrences are derived from this or an
+          # equivalent image via:
+          #   FROM &lt;Basis.resource_url&gt;
+          # Or an equivalent reference, e.g. a tag of the resource_url.
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+            # associated occurrence images.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+              #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+              # Only the name of the final blob is kept.
+              # This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+            &quot;A String&quot;,
+          ],
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
+              # representation.
+              # This field can be used as a filter in list requests.
+        },
+      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+          # filter in list requests.
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;details&quot;: [ # All information about the package to specifically identify this
+            # vulnerability. One entry per (version range and cpe_uri) the
+            # package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a
+              # specific distro/location
+              # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+                # obsolete details.
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+                # node.js packages etc)
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                  # filter in list requests.
+                  # For a discussion of this in Debian/Ubuntu:
+                  # http://serverfault.com/questions/604541/debian-packages-version-convention
+                  # For a discussion of this in Redhat/Fedora/Centos:
+                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                    # If kind is not NORMAL, then the other fields are ignored.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              },
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                  # format. Examples include distro or storage location for vulnerable jar.
+                  # This field can be used as a filter in list requests.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+                # This field can be used as a filter in list requests.
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+                # which the vulnerability manifests.  Examples include distro or storage
+                # location for vulnerable jar.
+                # This field can be used as a filter in list requests.
+          },
+        ],
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+      },
+      &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
+          # the provenance message in linked BuildDetails.
+        &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
+            # `BuilderDetails`.
+          &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+              # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+              # CN for a cert), or a reference to an external key (such as a reference to a
+              # key in Cloud Key Management Service).
+          &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+              # `key_id`
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
+              # findings are valid and unchanged. If `key_type` is empty, this defaults
+              # to PEM encoded public keys.
+              #
+              # This field may be empty if `key_id` references an external key.
+              #
+              # For Cloud Build based signatures, this is a PEM encoded public
+              # key. To verify the Cloud Build signature, place the contents of
+              # this field into a file (public.pem). The signature field is base64-decoded
+              # into its binary representation in signature.bin, and the provenance bytes
+              # from `BuildDetails` are base64-decoded into a binary representation in
+              # signed.bin. OpenSSL can then verify the signature:
+              # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+        },
+        &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
+      },
+      &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+          # field can be used as a filter in list requests.
+      &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
+      &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
+        &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
+          &quot;A String&quot;,
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+          # a filter in list requests.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+          # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+          # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+          # indicate the status of the analysis. Absence of an occurrence linked to this
+          # note for a resource indicates that analysis hasn&#x27;t started.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+      },
+      &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
+          # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
+          # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
+          # mechanism for the attached Occurrences (Attestations).  This grouping
+          # mechanism also provides a security boundary, since IAM ACLs gate the ability
+          # for a principle to attach an Occurrence to a given Note.  It also provides a
+          # single point of lookup to find all attached Attestation Occurrences, even if
+          # they don&#x27;t all live in the same project.
+        &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
+            # AttestationAuthority.  Because the name of a Note acts as its resource
+            # reference, it is important to disambiguate the canonical name of the Note
+            # (which might be a UUID for security purposes) from &quot;readable&quot; names more
+            # suitable for debug output.  Note that these hints should NOT be used to
+            # look up AttestationAuthorities in security sensitive contexts, such as when
+            # looking up Attestations to verify.
+          &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
+        },
+      },
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
+          # version. For each package version combination (i.e. bash 4.0, bash 4.1,
+          # bash 4.1.2), there will be a Upgrade Note.
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
+            # For a discussion of this in Debian/Ubuntu:
+            # http://serverfault.com/questions/604541/debian-packages-version-convention
+            # For a discussion of this in Redhat/Fedora/Centos:
+            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+              # If kind is not NORMAL, then the other fields are ignored.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+        },
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each
+              # operating system (CPE). Some distributions have additional metadata around
+              # updates, classifying them into various categories and severities.
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
+                # upstream operating system upgrade feed.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
+                # https://cpe.mitre.org/specification/.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+          },
+        ],
+      },
+    }</pre>
 </div>
 
 <div class="method">
@@ -613,224 +613,224 @@
   An object of the form:
 
     { # Provides a detailed description of a `Note`.
-    &quot;relatedUrl&quot;: [ # URLs associated with this note
-      { # Metadata for any related URL information
-        &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
-        &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
-      },
-    ],
-    &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
-    &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
-        # relationship.  Linked occurrences are derived from this or an
-        # equivalent image via:
-        #   FROM &lt;Basis.resource_url&gt;
-        # Or an equivalent reference, e.g. a tag of the resource_url.
-      &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-        &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-          &quot;A String&quot;,
-        ],
-        &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
-            # representation.
-            # This field can be used as a filter in list requests.
-        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-            #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-            # Only the name of the final blob is kept.
-            # This field can be used as a filter in list requests.
-      },
-      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-          # associated occurrence images.
-    },
-    &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-        # field can be used as a filter in list requests.
-    &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
-        # the provenance message in linked BuildDetails.
-      &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
-          # `BuilderDetails`.
-        &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
-            # findings are valid and unchanged. If `key_type` is empty, this defaults
-            # to PEM encoded public keys.
-            #
-            # This field may be empty if `key_id` references an external key.
-            #
-            # For Cloud Build based signatures, this is a PEM encoded public
-            # key. To verify the Cloud Build signature, place the contents of
-            # this field into a file (public.pem). The signature field is base64-decoded
-            # into its binary representation in signature.bin, and the provenance bytes
-            # from `BuildDetails` are base64-decoded into a binary representation in
-            # signed.bin. OpenSSL can then verify the signature:
-            # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-        &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-            # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-            # CN for a cert), or a reference to an external key (such as a reference to a
-            # key in Cloud Key Management Service).
-        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-            # `key_id`
-        &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
-      },
-      &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
-    },
-    &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-    &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
-      &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
-        &quot;A String&quot;,
-      ],
-    },
-    &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-    &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
-        # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
-        # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
-        # mechanism for the attached Occurrences (Attestations).  This grouping
-        # mechanism also provides a security boundary, since IAM ACLs gate the ability
-        # for a principle to attach an Occurrence to a given Note.  It also provides a
-        # single point of lookup to find all attached Attestation Occurrences, even if
-        # they don&#x27;t all live in the same project.
-      &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
-          # AttestationAuthority.  Because the name of a Note acts as its resource
-          # reference, it is important to disambiguate the canonical name of the Note
-          # (which might be a UUID for security purposes) from &quot;readable&quot; names more
-          # suitable for debug output.  Note that these hints should NOT be used to
-          # look up AttestationAuthorities in security sensitive contexts, such as when
-          # looking up Attestations to verify.
-        &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
-      },
-    },
-    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-        # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-      &quot;details&quot;: [ # All information about the package to specifically identify this
-          # vulnerability. One entry per (version range and cpe_uri) the
-          # package vulnerability has manifested in.
-        { # Identifies all occurrences of this vulnerability in the package for a
-            # specific distro/location
-            # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-                # filter in list requests.
+      &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+          # various channels.
+          # e.g. glibc (aka libc6) is distributed by many, at various versions.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package.
+              # e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+                # this distribution channel.
                 # For a discussion of this in Debian/Ubuntu:
                 # http://serverfault.com/questions/604541/debian-packages-version-convention
                 # For a discussion of this in Redhat/Fedora/Centos:
                 # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
               &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
               &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
                   # If kind is not NORMAL, then the other fields are ignored.
               &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
             },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-                # format. Examples include distro or storage location for vulnerable jar.
-                # This field can be used as a filter in list requests.
-            &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+                # channel were built
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+                # denoting the package manager version distributing a package.
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
           },
-          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-              # node.js packages etc)
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-              # which the vulnerability manifests.  Examples include distro or storage
-              # location for vulnerable jar.
-              # This field can be used as a filter in list requests.
-          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-              # This field can be used as a filter in list requests.
-          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-              # obsolete details.
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+          # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;relatedUrl&quot;: [ # URLs associated with this note
+        { # Metadata for any related URL information
+          &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+          &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-    },
-    &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
-        # version. For each package version combination (i.e. bash 4.0, bash 4.1,
-        # bash 4.1.2), there will be a Upgrade Note.
-      &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
-          # For a discussion of this in Debian/Ubuntu:
-          # http://serverfault.com/questions/604541/debian-packages-version-convention
-          # For a discussion of this in Redhat/Fedora/Centos:
-          # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-        &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-        &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-            # If kind is not NORMAL, then the other fields are ignored.
-        &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-      },
-      &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-        { # The Upgrade Distribution represents metadata about the Upgrade for each
-            # operating system (CPE). Some distributions have additional metadata around
-            # updates, classifying them into various categories and severities.
-          &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
-              # upstream operating system upgrade feed.
-          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
-              # https://cpe.mitre.org/specification/.
-          &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
+          # relationship.  Linked occurrences are derived from this or an
+          # equivalent image via:
+          #   FROM &lt;Basis.resource_url&gt;
+          # Or an equivalent reference, e.g. a tag of the resource_url.
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+            # associated occurrence images.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+              #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+              # Only the name of the final blob is kept.
+              # This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
             &quot;A String&quot;,
           ],
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
+              # representation.
+              # This field can be used as a filter in list requests.
         },
-      ],
-      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-    },
-    &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-        # various channels.
-        # e.g. glibc (aka libc6) is distributed by many, at various versions.
-      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-        { # This represents a particular channel of distribution for a given package.
-            # e.g. Debian&#x27;s jessie-backports dpkg mirror
-          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-              # this distribution channel.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+          # filter in list requests.
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;details&quot;: [ # All information about the package to specifically identify this
+            # vulnerability. One entry per (version range and cpe_uri) the
+            # package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a
+              # specific distro/location
+              # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+                # obsolete details.
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+                # node.js packages etc)
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                  # filter in list requests.
+                  # For a discussion of this in Debian/Ubuntu:
+                  # http://serverfault.com/questions/604541/debian-packages-version-convention
+                  # For a discussion of this in Redhat/Fedora/Centos:
+                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                    # If kind is not NORMAL, then the other fields are ignored.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              },
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                  # format. Examples include distro or storage location for vulnerable jar.
+                  # This field can be used as a filter in list requests.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+                # This field can be used as a filter in list requests.
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+                # which the vulnerability manifests.  Examples include distro or storage
+                # location for vulnerable jar.
+                # This field can be used as a filter in list requests.
           },
-          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-              # denoting the package manager version distributing a package.
-          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-              # channel were built
-          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+        ],
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+      },
+      &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
+          # the provenance message in linked BuildDetails.
+        &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
+            # `BuilderDetails`.
+          &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+              # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+              # CN for a cert), or a reference to an external key (such as a reference to a
+              # key in Cloud Key Management Service).
+          &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+              # `key_id`
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
+              # findings are valid and unchanged. If `key_type` is empty, this defaults
+              # to PEM encoded public keys.
+              #
+              # This field may be empty if `key_id` references an external key.
+              #
+              # For Cloud Build based signatures, this is a PEM encoded public
+              # key. To verify the Cloud Build signature, place the contents of
+              # this field into a file (public.pem). The signature field is base64-decoded
+              # into its binary representation in signature.bin, and the provenance bytes
+              # from `BuildDetails` are base64-decoded into a binary representation in
+              # signed.bin. OpenSSL can then verify the signature:
+              # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
         },
-      ],
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-        # filter in list requests.
-    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-        # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-        # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-        # indicate the status of the analysis. Absence of an occurrence linked to this
-        # note for a resource indicates that analysis hasn&#x27;t started.
-      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-    },
-    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-        # a filter in list requests.
-  }</pre>
+        &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
+      },
+      &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+          # field can be used as a filter in list requests.
+      &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
+      &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
+        &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
+          &quot;A String&quot;,
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+          # a filter in list requests.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+          # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+          # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+          # indicate the status of the analysis. Absence of an occurrence linked to this
+          # note for a resource indicates that analysis hasn&#x27;t started.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+      },
+      &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
+          # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
+          # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
+          # mechanism for the attached Occurrences (Attestations).  This grouping
+          # mechanism also provides a security boundary, since IAM ACLs gate the ability
+          # for a principle to attach an Occurrence to a given Note.  It also provides a
+          # single point of lookup to find all attached Attestation Occurrences, even if
+          # they don&#x27;t all live in the same project.
+        &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
+            # AttestationAuthority.  Because the name of a Note acts as its resource
+            # reference, it is important to disambiguate the canonical name of the Note
+            # (which might be a UUID for security purposes) from &quot;readable&quot; names more
+            # suitable for debug output.  Note that these hints should NOT be used to
+            # look up AttestationAuthorities in security sensitive contexts, such as when
+            # looking up Attestations to verify.
+          &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
+        },
+      },
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
+          # version. For each package version combination (i.e. bash 4.0, bash 4.1,
+          # bash 4.1.2), there will be a Upgrade Note.
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
+            # For a discussion of this in Debian/Ubuntu:
+            # http://serverfault.com/questions/604541/debian-packages-version-convention
+            # For a discussion of this in Redhat/Fedora/Centos:
+            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+              # If kind is not NORMAL, then the other fields are ignored.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+        },
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each
+              # operating system (CPE). Some distributions have additional metadata around
+              # updates, classifying them into various categories and severities.
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
+                # upstream operating system upgrade feed.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
+                # https://cpe.mitre.org/specification/.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+          },
+        ],
+      },
+    }</pre>
 </div>
 
 <div class="method">
@@ -946,48 +946,10 @@
       #
       # For a description of IAM and its features, see the
       # [IAM documentation](https://cloud.google.com/iam/docs/).
-    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-        # prevent simultaneous updates of a policy from overwriting each other.
-        # It is strongly suggested that systems make use of the `etag` in the
-        # read-modify-write cycle to perform policy updates in order to avoid race
-        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-        # systems are expected to put that etag in the request to `setIamPolicy` to
-        # ensure that their change will be applied to the same version of the policy.
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-    &quot;version&quot;: 42, # Specifies the format of the policy.
-        #
-        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-        # are rejected.
-        #
-        # Any operation that affects conditional role bindings must specify version
-        # `3`. This requirement applies to the following operations:
-        #
-        # * Getting a policy that includes a conditional role binding
-        # * Adding a conditional role binding to a policy
-        # * Changing a conditional role binding in a policy
-        # * Removing any role binding, with or without a condition, from a policy
-        #   that includes conditions
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-        #
-        # If a policy does not include any conditions, operations on that policy may
-        # specify any valid version or leave the field unset.
-        #
-        # To learn which resources support conditions in their IAM policies, see the
-        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
     &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
         # `condition` that determines how and when the `bindings` are applied. Each
         # of the `bindings` must contain at least one member.
       { # Associates `members` with a `role`.
-        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
             #
             # If the condition evaluates to `true`, then this binding applies to the
@@ -1033,12 +995,12 @@
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
               # its purpose. This can be used e.g. in UIs which allow to enter the
               # expression.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+              # syntax.
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
               # reporting, e.g. a file name and a position in the file.
           &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
               # describes the expression, e.g. when hovered over it in a UI.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-              # syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
             # `members` can have the following values:
@@ -1085,13 +1047,51 @@
             #
           &quot;A String&quot;,
         ],
+        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
       },
     ],
+    &quot;version&quot;: 42, # Specifies the format of the policy.
+        #
+        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+        # are rejected.
+        #
+        # Any operation that affects conditional role bindings must specify version
+        # `3`. This requirement applies to the following operations:
+        #
+        # * Getting a policy that includes a conditional role binding
+        # * Adding a conditional role binding to a policy
+        # * Changing a conditional role binding in a policy
+        # * Removing any role binding, with or without a condition, from a policy
+        #   that includes conditions
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
+        #
+        # If a policy does not include any conditions, operations on that policy may
+        # specify any valid version or leave the field unset.
+        #
+        # To learn which resources support conditions in their IAM policies, see the
+        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+        # prevent simultaneous updates of a policy from overwriting each other.
+        # It is strongly suggested that systems make use of the `etag` in the
+        # read-modify-write cycle to perform policy updates in order to avoid race
+        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+        # systems are expected to put that etag in the request to `setIamPolicy` to
+        # ensure that their change will be applied to the same version of the policy.
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
   }</pre>
 </div>
 
 <div class="method">
-    <code class="details" id="list">list(name, pageToken=None, pageSize=None, parent=None, filter=None, x__xgafv=None)</code>
+    <code class="details" id="list">list(name, pageToken=None, pageSize=None, filter=None, parent=None, x__xgafv=None)</code>
   <pre>Lists all `Notes` for a given project.
 
 Args:
@@ -1100,8 +1100,8 @@
 @Deprecated (required)
   pageToken: string, Token to provide to skip to a particular spot in the list.
   pageSize: integer, Number of notes to return in the list.
-  parent: string, This field contains the project Id for example: &quot;projects/{PROJECT_ID}&quot;.
   filter: string, The filter expression.
+  parent: string, This field contains the project Id for example: &quot;projects/{PROJECT_ID}&quot;.
   x__xgafv: string, V1 error format.
     Allowed values
       1 - v1 error format
@@ -1113,224 +1113,224 @@
     { # Response including listed notes.
     &quot;notes&quot;: [ # The occurrences requested
       { # Provides a detailed description of a `Note`.
-        &quot;relatedUrl&quot;: [ # URLs associated with this note
-          { # Metadata for any related URL information
-            &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
-            &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
-          },
-        ],
-        &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
-        &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
-            # relationship.  Linked occurrences are derived from this or an
-            # equivalent image via:
-            #   FROM &lt;Basis.resource_url&gt;
-            # Or an equivalent reference, e.g. a tag of the resource_url.
-          &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-            &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-              &quot;A String&quot;,
-            ],
-            &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
-                # representation.
-                # This field can be used as a filter in list requests.
-            &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-                #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-                # Only the name of the final blob is kept.
-                # This field can be used as a filter in list requests.
-          },
-          &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-              # associated occurrence images.
-        },
-        &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-            # field can be used as a filter in list requests.
-        &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
-            # the provenance message in linked BuildDetails.
-          &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
-              # `BuilderDetails`.
-            &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
-                # findings are valid and unchanged. If `key_type` is empty, this defaults
-                # to PEM encoded public keys.
-                #
-                # This field may be empty if `key_id` references an external key.
-                #
-                # For Cloud Build based signatures, this is a PEM encoded public
-                # key. To verify the Cloud Build signature, place the contents of
-                # this field into a file (public.pem). The signature field is base64-decoded
-                # into its binary representation in signature.bin, and the provenance bytes
-                # from `BuildDetails` are base64-decoded into a binary representation in
-                # signed.bin. OpenSSL can then verify the signature:
-                # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-            &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-                # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-                # CN for a cert), or a reference to an external key (such as a reference to a
-                # key in Cloud Key Management Service).
-            &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-                # `key_id`
-            &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
-          },
-          &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
-        },
-        &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-        &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
-          &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
-            &quot;A String&quot;,
-          ],
-        },
-        &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-        &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
-            # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
-            # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
-            # mechanism for the attached Occurrences (Attestations).  This grouping
-            # mechanism also provides a security boundary, since IAM ACLs gate the ability
-            # for a principle to attach an Occurrence to a given Note.  It also provides a
-            # single point of lookup to find all attached Attestation Occurrences, even if
-            # they don&#x27;t all live in the same project.
-          &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
-              # AttestationAuthority.  Because the name of a Note acts as its resource
-              # reference, it is important to disambiguate the canonical name of the Note
-              # (which might be a UUID for security purposes) from &quot;readable&quot; names more
-              # suitable for debug output.  Note that these hints should NOT be used to
-              # look up AttestationAuthorities in security sensitive contexts, such as when
-              # looking up Attestations to verify.
-            &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
-          },
-        },
-        &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-            # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-        &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-          &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-          &quot;details&quot;: [ # All information about the package to specifically identify this
-              # vulnerability. One entry per (version range and cpe_uri) the
-              # package vulnerability has manifested in.
-            { # Identifies all occurrences of this vulnerability in the package for a
-                # specific distro/location
-                # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-              &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-                &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-                    # filter in list requests.
+          &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+              # various channels.
+              # e.g. glibc (aka libc6) is distributed by many, at various versions.
+            &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+              { # This represents a particular channel of distribution for a given package.
+                  # e.g. Debian&#x27;s jessie-backports dpkg mirror
+                &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+                    # this distribution channel.
                     # For a discussion of this in Debian/Ubuntu:
                     # http://serverfault.com/questions/604541/debian-packages-version-convention
                     # For a discussion of this in Redhat/Fedora/Centos:
                     # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
                   &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
                   &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
                       # If kind is not NORMAL, then the other fields are ignored.
                   &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
                 },
-                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-                    # format. Examples include distro or storage location for vulnerable jar.
-                    # This field can be used as a filter in list requests.
-                &quot;package&quot;: &quot;A String&quot;, # The package being described.
+                &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+                &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+                    # channel were built
+                &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+                    # denoting the package manager version distributing a package.
+                &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
               },
-              &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-                  # node.js packages etc)
-              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-                  # which the vulnerability manifests.  Examples include distro or storage
-                  # location for vulnerable jar.
-                  # This field can be used as a filter in list requests.
-              &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-              &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-                  # For a discussion of this in Debian/Ubuntu:
-                  # http://serverfault.com/questions/604541/debian-packages-version-convention
-                  # For a discussion of this in Redhat/Fedora/Centos:
-                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                    # If kind is not NORMAL, then the other fields are ignored.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              },
-              &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-              &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-                  # This field can be used as a filter in list requests.
-              &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-                  # For a discussion of this in Debian/Ubuntu:
-                  # http://serverfault.com/questions/604541/debian-packages-version-convention
-                  # For a discussion of this in Redhat/Fedora/Centos:
-                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                    # If kind is not NORMAL, then the other fields are ignored.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-              },
-              &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-                  # obsolete details.
+            ],
+            &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+          },
+          &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+              # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+          &quot;relatedUrl&quot;: [ # URLs associated with this note
+            { # Metadata for any related URL information
+              &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+              &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
             },
           ],
-          &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-        },
-        &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
-            # version. For each package version combination (i.e. bash 4.0, bash 4.1,
-            # bash 4.1.2), there will be a Upgrade Note.
-          &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-            { # The Upgrade Distribution represents metadata about the Upgrade for each
-                # operating system (CPE). Some distributions have additional metadata around
-                # updates, classifying them into various categories and severities.
-              &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
-                  # upstream operating system upgrade feed.
-              &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-              &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
-                  # https://cpe.mitre.org/specification/.
-              &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+          &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+          &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
+              # relationship.  Linked occurrences are derived from this or an
+              # equivalent image via:
+              #   FROM &lt;Basis.resource_url&gt;
+              # Or an equivalent reference, e.g. a tag of the resource_url.
+            &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+                # associated occurrence images.
+            &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+              &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+                  #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+                  # Only the name of the final blob is kept.
+                  # This field can be used as a filter in list requests.
+              &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
                 &quot;A String&quot;,
               ],
+              &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
+                  # representation.
+                  # This field can be used as a filter in list requests.
             },
-          ],
-          &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-        },
-        &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-            # various channels.
-            # e.g. glibc (aka libc6) is distributed by many, at various versions.
-          &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-          &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-            { # This represents a particular channel of distribution for a given package.
-                # e.g. Debian&#x27;s jessie-backports dpkg mirror
-              &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-                  # this distribution channel.
-                  # For a discussion of this in Debian/Ubuntu:
-                  # http://serverfault.com/questions/604541/debian-packages-version-convention
-                  # For a discussion of this in Redhat/Fedora/Centos:
-                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                    # If kind is not NORMAL, then the other fields are ignored.
-                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          },
+          &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+              # filter in list requests.
+          &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+            &quot;details&quot;: [ # All information about the package to specifically identify this
+                # vulnerability. One entry per (version range and cpe_uri) the
+                # package vulnerability has manifested in.
+              { # Identifies all occurrences of this vulnerability in the package for a
+                  # specific distro/location
+                  # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+                &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+                    # obsolete details.
+                &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+                    # For a discussion of this in Debian/Ubuntu:
+                    # http://serverfault.com/questions/604541/debian-packages-version-convention
+                    # For a discussion of this in Redhat/Fedora/Centos:
+                    # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                      # If kind is not NORMAL, then the other fields are ignored.
+                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                },
+                &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+                    # For a discussion of this in Debian/Ubuntu:
+                    # http://serverfault.com/questions/604541/debian-packages-version-convention
+                    # For a discussion of this in Redhat/Fedora/Centos:
+                    # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                  &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                  &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                  &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                      # If kind is not NORMAL, then the other fields are ignored.
+                  &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                },
+                &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+                    # node.js packages etc)
+                &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+                  &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                      # filter in list requests.
+                      # For a discussion of this in Debian/Ubuntu:
+                      # http://serverfault.com/questions/604541/debian-packages-version-convention
+                      # For a discussion of this in Redhat/Fedora/Centos:
+                      # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                    &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                    &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                    &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                        # If kind is not NORMAL, then the other fields are ignored.
+                    &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+                  },
+                  &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                      # format. Examples include distro or storage location for vulnerable jar.
+                      # This field can be used as a filter in list requests.
+                  &quot;package&quot;: &quot;A String&quot;, # The package being described.
+                },
+                &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+                &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+                    # This field can be used as a filter in list requests.
+                &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+                &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+                    # which the vulnerability manifests.  Examples include distro or storage
+                    # location for vulnerable jar.
+                    # This field can be used as a filter in list requests.
               },
-              &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-                  # denoting the package manager version distributing a package.
-              &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-              &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-                  # channel were built
-              &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            ],
+            &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+            &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+          },
+          &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
+              # the provenance message in linked BuildDetails.
+            &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
+                # `BuilderDetails`.
+              &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+                  # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+                  # CN for a cert), or a reference to an external key (such as a reference to a
+                  # key in Cloud Key Management Service).
+              &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+              &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+                  # `key_id`
+              &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
+                  # findings are valid and unchanged. If `key_type` is empty, this defaults
+                  # to PEM encoded public keys.
+                  #
+                  # This field may be empty if `key_id` references an external key.
+                  #
+                  # For Cloud Build based signatures, this is a PEM encoded public
+                  # key. To verify the Cloud Build signature, place the contents of
+                  # this field into a file (public.pem). The signature field is base64-decoded
+                  # into its binary representation in signature.bin, and the provenance bytes
+                  # from `BuildDetails` are base64-decoded into a binary representation in
+                  # signed.bin. OpenSSL can then verify the signature:
+                  # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
             },
-          ],
+            &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
+          },
+          &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+              # field can be used as a filter in list requests.
+          &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
+          &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
+            &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
+              &quot;A String&quot;,
+            ],
+          },
+          &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+              # a filter in list requests.
+          &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+          &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+              # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+              # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+              # indicate the status of the analysis. Absence of an occurrence linked to this
+              # note for a resource indicates that analysis hasn&#x27;t started.
+            &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+          },
+          &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
+              # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
+              # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
+              # mechanism for the attached Occurrences (Attestations).  This grouping
+              # mechanism also provides a security boundary, since IAM ACLs gate the ability
+              # for a principle to attach an Occurrence to a given Note.  It also provides a
+              # single point of lookup to find all attached Attestation Occurrences, even if
+              # they don&#x27;t all live in the same project.
+            &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
+                # AttestationAuthority.  Because the name of a Note acts as its resource
+                # reference, it is important to disambiguate the canonical name of the Note
+                # (which might be a UUID for security purposes) from &quot;readable&quot; names more
+                # suitable for debug output.  Note that these hints should NOT be used to
+                # look up AttestationAuthorities in security sensitive contexts, such as when
+                # looking up Attestations to verify.
+              &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
+            },
+          },
+          &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
+              # version. For each package version combination (i.e. bash 4.0, bash 4.1,
+              # bash 4.1.2), there will be a Upgrade Note.
+            &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+              { # The Upgrade Distribution represents metadata about the Upgrade for each
+                  # operating system (CPE). Some distributions have additional metadata around
+                  # updates, classifying them into various categories and severities.
+                &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
+                    # upstream operating system upgrade feed.
+                &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
+                    # https://cpe.mitre.org/specification/.
+                &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+                &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+                  &quot;A String&quot;,
+                ],
+              },
+            ],
+          },
         },
-        &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-            # filter in list requests.
-        &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-            # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-            # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-            # indicate the status of the analysis. Absence of an occurrence linked to this
-            # note for a resource indicates that analysis hasn&#x27;t started.
-          &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-        },
-        &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-            # a filter in list requests.
-      },
     ],
     &quot;nextPageToken&quot;: &quot;A String&quot;, # The next pagination token in the list response. It should be used as
         # page_token for the following request. An empty value means no more result.
@@ -1362,239 +1362,41 @@
     The object takes the form of:
 
 { # Provides a detailed description of a `Note`.
-  &quot;relatedUrl&quot;: [ # URLs associated with this note
-    { # Metadata for any related URL information
-      &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
-      &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
-    },
-  ],
-  &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
-  &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
-      # relationship.  Linked occurrences are derived from this or an
-      # equivalent image via:
-      #   FROM &lt;Basis.resource_url&gt;
-      # Or an equivalent reference, e.g. a tag of the resource_url.
-    &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
-      &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
-        &quot;A String&quot;,
-      ],
-      &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
-          # representation.
-          # This field can be used as a filter in list requests.
-      &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-          #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-          # Only the name of the final blob is kept.
-          # This field can be used as a filter in list requests.
-    },
-    &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-        # associated occurrence images.
-  },
-  &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-      # field can be used as a filter in list requests.
-  &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
-      # the provenance message in linked BuildDetails.
-    &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
-        # `BuilderDetails`.
-      &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
-          # findings are valid and unchanged. If `key_type` is empty, this defaults
-          # to PEM encoded public keys.
-          #
-          # This field may be empty if `key_id` references an external key.
-          #
-          # For Cloud Build based signatures, this is a PEM encoded public
-          # key. To verify the Cloud Build signature, place the contents of
-          # this field into a file (public.pem). The signature field is base64-decoded
-          # into its binary representation in signature.bin, and the provenance bytes
-          # from `BuildDetails` are base64-decoded into a binary representation in
-          # signed.bin. OpenSSL can then verify the signature:
-          # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-      &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-          # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-          # CN for a cert), or a reference to an external key (such as a reference to a
-          # key in Cloud Key Management Service).
-      &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-          # `key_id`
-      &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
-    },
-    &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
-  },
-  &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
-  &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
-    &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
-      &quot;A String&quot;,
-    ],
-  },
-  &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
-  &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
-      # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
-      # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
-      # mechanism for the attached Occurrences (Attestations).  This grouping
-      # mechanism also provides a security boundary, since IAM ACLs gate the ability
-      # for a principle to attach an Occurrence to a given Note.  It also provides a
-      # single point of lookup to find all attached Attestation Occurrences, even if
-      # they don&#x27;t all live in the same project.
-    &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
-        # AttestationAuthority.  Because the name of a Note acts as its resource
-        # reference, it is important to disambiguate the canonical name of the Note
-        # (which might be a UUID for security purposes) from &quot;readable&quot; names more
-        # suitable for debug output.  Note that these hints should NOT be used to
-        # look up AttestationAuthorities in security sensitive contexts, such as when
-        # looking up Attestations to verify.
-      &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
-    },
-  },
-  &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-      # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-  &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-    &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-    &quot;details&quot;: [ # All information about the package to specifically identify this
-        # vulnerability. One entry per (version range and cpe_uri) the
-        # package vulnerability has manifested in.
-      { # Identifies all occurrences of this vulnerability in the package for a
-          # specific distro/location
-          # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-        &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-          &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-              # filter in list requests.
+    &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+        # various channels.
+        # e.g. glibc (aka libc6) is distributed by many, at various versions.
+      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+        { # This represents a particular channel of distribution for a given package.
+            # e.g. Debian&#x27;s jessie-backports dpkg mirror
+          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+              # this distribution channel.
               # For a discussion of this in Debian/Ubuntu:
               # http://serverfault.com/questions/604541/debian-packages-version-convention
               # For a discussion of this in Redhat/Fedora/Centos:
               # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
             &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
             &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
                 # If kind is not NORMAL, then the other fields are ignored.
             &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
           },
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-              # format. Examples include distro or storage location for vulnerable jar.
-              # This field can be used as a filter in list requests.
-          &quot;package&quot;: &quot;A String&quot;, # The package being described.
+          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+              # channel were built
+          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+              # denoting the package manager version distributing a package.
+          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
         },
-        &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-            # node.js packages etc)
-        &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-            # which the vulnerability manifests.  Examples include distro or storage
-            # location for vulnerable jar.
-            # This field can be used as a filter in list requests.
-        &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-        &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-        &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-            # This field can be used as a filter in list requests.
-        &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-            # obsolete details.
-      },
-    ],
-    &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-  },
-  &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
-      # version. For each package version combination (i.e. bash 4.0, bash 4.1,
-      # bash 4.1.2), there will be a Upgrade Note.
-    &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
-        # For a discussion of this in Debian/Ubuntu:
-        # http://serverfault.com/questions/604541/debian-packages-version-convention
-        # For a discussion of this in Redhat/Fedora/Centos:
-        # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-      &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-      &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-          # If kind is not NORMAL, then the other fields are ignored.
-      &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-      &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+      ],
+      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
     },
-    &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
-      { # The Upgrade Distribution represents metadata about the Upgrade for each
-          # operating system (CPE). Some distributions have additional metadata around
-          # updates, classifying them into various categories and severities.
-        &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
-            # upstream operating system upgrade feed.
-        &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
-        &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
-            # https://cpe.mitre.org/specification/.
-        &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
-          &quot;A String&quot;,
-        ],
-      },
-    ],
-    &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
-  },
-  &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-      # various channels.
-      # e.g. glibc (aka libc6) is distributed by many, at various versions.
-    &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-    &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-      { # This represents a particular channel of distribution for a given package.
-          # e.g. Debian&#x27;s jessie-backports dpkg mirror
-        &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-            # this distribution channel.
-            # For a discussion of this in Debian/Ubuntu:
-            # http://serverfault.com/questions/604541/debian-packages-version-convention
-            # For a discussion of this in Redhat/Fedora/Centos:
-            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-              # If kind is not NORMAL, then the other fields are ignored.
-          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-        },
-        &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-        &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-            # denoting the package manager version distributing a package.
-        &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-        &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-            # channel were built
-        &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
-      },
-    ],
-  },
-  &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-      # filter in list requests.
-  &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-      # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-      # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-      # indicate the status of the analysis. Absence of an occurrence linked to this
-      # note for a resource indicates that analysis hasn&#x27;t started.
-    &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-  },
-  &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-      # a filter in list requests.
-}
-
-  updateMask: string, The fields to update.
-  x__xgafv: string, V1 error format.
-    Allowed values
-      1 - v1 error format
-      2 - v2 error format
-
-Returns:
-  An object of the form:
-
-    { # Provides a detailed description of a `Note`.
+    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+        # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
     &quot;relatedUrl&quot;: [ # URLs associated with this note
       { # Metadata for any related URL information
-        &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+        &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
       },
     ],
     &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
@@ -1603,27 +1405,98 @@
         # equivalent image via:
         #   FROM &lt;Basis.resource_url&gt;
         # Or an equivalent reference, e.g. a tag of the resource_url.
+      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+          # associated occurrence images.
       &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+            #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+            # Only the name of the final blob is kept.
+            # This field can be used as a filter in list requests.
         &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
           &quot;A String&quot;,
         ],
         &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
             # representation.
             # This field can be used as a filter in list requests.
-        &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
-            #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
-            # Only the name of the final blob is kept.
-            # This field can be used as a filter in list requests.
       },
-      &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
-          # associated occurrence images.
     },
-    &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
-        # field can be used as a filter in list requests.
+    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+        # filter in list requests.
+    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+      &quot;details&quot;: [ # All information about the package to specifically identify this
+          # vulnerability. One entry per (version range and cpe_uri) the
+          # package vulnerability has manifested in.
+        { # Identifies all occurrences of this vulnerability in the package for a
+            # specific distro/location
+            # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+              # obsolete details.
+          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+              # For a discussion of this in Debian/Ubuntu:
+              # http://serverfault.com/questions/604541/debian-packages-version-convention
+              # For a discussion of this in Redhat/Fedora/Centos:
+              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                # If kind is not NORMAL, then the other fields are ignored.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          },
+          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+              # For a discussion of this in Debian/Ubuntu:
+              # http://serverfault.com/questions/604541/debian-packages-version-convention
+              # For a discussion of this in Redhat/Fedora/Centos:
+              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                # If kind is not NORMAL, then the other fields are ignored.
+            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+          },
+          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+              # node.js packages etc)
+          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+            &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                # filter in list requests.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                # format. Examples include distro or storage location for vulnerable jar.
+                # This field can be used as a filter in list requests.
+            &quot;package&quot;: &quot;A String&quot;, # The package being described.
+          },
+          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+              # This field can be used as a filter in list requests.
+          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+              # which the vulnerability manifests.  Examples include distro or storage
+              # location for vulnerable jar.
+              # This field can be used as a filter in list requests.
+        },
+      ],
+      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+    },
     &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
         # the provenance message in linked BuildDetails.
       &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
           # `BuilderDetails`.
+        &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+            # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+            # CN for a cert), or a reference to an external key (such as a reference to a
+            # key in Cloud Key Management Service).
+        &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+            # `key_id`
         &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
             # findings are valid and unchanged. If `key_type` is empty, this defaults
             # to PEM encoded public keys.
@@ -1637,23 +1510,27 @@
             # from `BuildDetails` are base64-decoded into a binary representation in
             # signed.bin. OpenSSL can then verify the signature:
             # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
-        &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
-            # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
-            # CN for a cert), or a reference to an external key (such as a reference to a
-            # key in Cloud Key Management Service).
-        &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
-            # `key_id`
-        &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
       },
       &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
     },
+    &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+        # field can be used as a filter in list requests.
     &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
     &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
       &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
         &quot;A String&quot;,
       ],
     },
+    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+        # a filter in list requests.
     &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+        # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+        # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+        # indicate the status of the analysis. Absence of an occurrence linked to this
+        # note for a resource indicates that analysis hasn&#x27;t started.
+      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+    },
     &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
         # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
         # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
@@ -1672,85 +1549,20 @@
         &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
       },
     },
-    &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
-        # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
-    &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
-      &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
-      &quot;details&quot;: [ # All information about the package to specifically identify this
-          # vulnerability. One entry per (version range and cpe_uri) the
-          # package vulnerability has manifested in.
-        { # Identifies all occurrences of this vulnerability in the package for a
-            # specific distro/location
-            # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
-          &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
-            &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
-                # filter in list requests.
-                # For a discussion of this in Debian/Ubuntu:
-                # http://serverfault.com/questions/604541/debian-packages-version-convention
-                # For a discussion of this in Redhat/Fedora/Centos:
-                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                  # If kind is not NORMAL, then the other fields are ignored.
-              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-            },
-            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
-                # format. Examples include distro or storage location for vulnerable jar.
-                # This field can be used as a filter in list requests.
-            &quot;package&quot;: &quot;A String&quot;, # The package being described.
-          },
-          &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
-              # node.js packages etc)
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
-              # which the vulnerability manifests.  Examples include distro or storage
-              # location for vulnerable jar.
-              # This field can be used as a filter in list requests.
-          &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
-          &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
-          &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
-              # This field can be used as a filter in list requests.
-          &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
-          },
-          &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
-              # obsolete details.
-        },
-      ],
-      &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
-    },
     &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
         # version. For each package version combination (i.e. bash 4.0, bash 4.1,
         # bash 4.1.2), there will be a Upgrade Note.
+      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
       &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
           # For a discussion of this in Debian/Ubuntu:
           # http://serverfault.com/questions/604541/debian-packages-version-convention
           # For a discussion of this in Redhat/Fedora/Centos:
           # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
         &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
         &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
             # If kind is not NORMAL, then the other fields are ignored.
         &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-        &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
       },
       &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
         { # The Upgrade Distribution represents metadata about the Upgrade for each
@@ -1758,57 +1570,245 @@
             # updates, classifying them into various categories and severities.
           &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
               # upstream operating system upgrade feed.
-          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
           &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
               # https://cpe.mitre.org/specification/.
+          &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
           &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
             &quot;A String&quot;,
           ],
         },
       ],
-      &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
     },
-    &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
-        # various channels.
-        # e.g. glibc (aka libc6) is distributed by many, at various versions.
-      &quot;name&quot;: &quot;A String&quot;, # The name of the package.
-      &quot;distribution&quot;: [ # The various channels by which a package is distributed.
-        { # This represents a particular channel of distribution for a given package.
-            # e.g. Debian&#x27;s jessie-backports dpkg mirror
-          &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
-              # this distribution channel.
-              # For a discussion of this in Debian/Ubuntu:
-              # http://serverfault.com/questions/604541/debian-packages-version-convention
-              # For a discussion of this in Redhat/Fedora/Centos:
-              # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
-            &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
-            &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
-                # If kind is not NORMAL, then the other fields are ignored.
-            &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
-            &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+  }
+
+  updateMask: string, The fields to update.
+  x__xgafv: string, V1 error format.
+    Allowed values
+      1 - v1 error format
+      2 - v2 error format
+
+Returns:
+  An object of the form:
+
+    { # Provides a detailed description of a `Note`.
+      &quot;package&quot;: { # This represents a particular package that is distributed over # A note describing a package hosted by various package managers.
+          # various channels.
+          # e.g. glibc (aka libc6) is distributed by many, at various versions.
+        &quot;distribution&quot;: [ # The various channels by which a package is distributed.
+          { # This represents a particular channel of distribution for a given package.
+              # e.g. Debian&#x27;s jessie-backports dpkg mirror
+            &quot;latestVersion&quot;: { # Version contains structured information about the version of the package. # The latest available version of this package in
+                # this distribution channel.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+            &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
+                # channel were built
+            &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
+                # denoting the package manager version distributing a package.
+            &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
           },
-          &quot;description&quot;: &quot;A String&quot;, # The distribution channel-specific description of this package.
-          &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format](https://cpe.mitre.org/specification/)
-              # denoting the package manager version distributing a package.
-          &quot;url&quot;: &quot;A String&quot;, # The distribution channel-specific homepage for this package.
-          &quot;architecture&quot;: &quot;A String&quot;, # The CPU architecture for which packages in this distribution
-              # channel were built
-          &quot;maintainer&quot;: &quot;A String&quot;, # A freeform string denoting the maintainer of this package.
+        ],
+        &quot;name&quot;: &quot;A String&quot;, # The name of the package.
+      },
+      &quot;name&quot;: &quot;A String&quot;, # The name of the note in the form
+          # &quot;projects/{provider_project_id}/notes/{NOTE_ID}&quot;
+      &quot;relatedUrl&quot;: [ # URLs associated with this note
+        { # Metadata for any related URL information
+          &quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL
+          &quot;url&quot;: &quot;A String&quot;, # Specific URL to associate with the note
         },
       ],
-    },
-    &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
-        # filter in list requests.
-    &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
-        # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
-        # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
-        # indicate the status of the analysis. Absence of an occurrence linked to this
-        # note for a resource indicates that analysis hasn&#x27;t started.
-      &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
-    },
-    &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
-        # a filter in list requests.
-  }</pre>
+      &quot;expirationTime&quot;: &quot;A String&quot;, # Time of expiration for this note, null if note does not expire.
+      &quot;baseImage&quot;: { # Basis describes the base image portion (Note) of the DockerImage # A note describing a base image.
+          # relationship.  Linked occurrences are derived from this or an
+          # equivalent image via:
+          #   FROM &lt;Basis.resource_url&gt;
+          # Or an equivalent reference, e.g. a tag of the resource_url.
+        &quot;resourceUrl&quot;: &quot;A String&quot;, # The resource_url for the resource representing the basis of
+            # associated occurrence images.
+        &quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # The fingerprint of the base image.
+          &quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via:
+              #   [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1])
+              # Only the name of the final blob is kept.
+              # This field can be used as a filter in list requests.
+          &quot;v2Blob&quot;: [ # The ordered list of v2 blobs that represent a given image.
+            &quot;A String&quot;,
+          ],
+          &quot;v1Name&quot;: &quot;A String&quot;, # The layer-id of the final layer in the Docker image&#x27;s v1
+              # representation.
+              # This field can be used as a filter in list requests.
+        },
+      },
+      &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a
+          # filter in list requests.
+      &quot;vulnerabilityType&quot;: { # VulnerabilityType provides metadata about a security vulnerability. # A package vulnerability type of note.
+        &quot;details&quot;: [ # All information about the package to specifically identify this
+            # vulnerability. One entry per (version range and cpe_uri) the
+            # package vulnerability has manifested in.
+          { # Identifies all occurrences of this vulnerability in the package for a
+              # specific distro/location
+              # For example: glibc in cpe:/o:debian:debian_linux:8 for versions 2.1 - 2.2
+            &quot;isObsolete&quot;: True or False, # Whether this Detail is obsolete. Occurrences are expected not to point to
+                # obsolete details.
+            &quot;minAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The min version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;maxAffectedVersion&quot;: { # Version contains structured information about the version of the package. # The max version of the package in which the vulnerability exists.
+                # For a discussion of this in Debian/Ubuntu:
+                # http://serverfault.com/questions/604541/debian-packages-version-convention
+                # For a discussion of this in Redhat/Fedora/Centos:
+                # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+              &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+              &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+              &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                  # If kind is not NORMAL, then the other fields are ignored.
+              &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+            },
+            &quot;packageType&quot;: &quot;A String&quot;, # The type of package; whether native or non native(ruby gems,
+                # node.js packages etc)
+            &quot;fixedLocation&quot;: { # The location of the vulnerability # The fix for this specific package version.
+              &quot;version&quot;: { # Version contains structured information about the version of the package. # The version of the package being described. This field can be used as a
+                  # filter in list requests.
+                  # For a discussion of this in Debian/Ubuntu:
+                  # http://serverfault.com/questions/604541/debian-packages-version-convention
+                  # For a discussion of this in Redhat/Fedora/Centos:
+                  # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+                &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+                &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+                &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+                    # If kind is not NORMAL, then the other fields are ignored.
+                &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+              },
+              &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/)
+                  # format. Examples include distro or storage location for vulnerable jar.
+                  # This field can be used as a filter in list requests.
+              &quot;package&quot;: &quot;A String&quot;, # The package being described.
+            },
+            &quot;description&quot;: &quot;A String&quot;, # A vendor-specific description of this note.
+            &quot;package&quot;: &quot;A String&quot;, # The name of the package where the vulnerability was found.
+                # This field can be used as a filter in list requests.
+            &quot;severityName&quot;: &quot;A String&quot;, # The severity (eg: distro assigned severity) for this vulnerability.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in
+                # which the vulnerability manifests.  Examples include distro or storage
+                # location for vulnerable jar.
+                # This field can be used as a filter in list requests.
+          },
+        ],
+        &quot;severity&quot;: &quot;A String&quot;, # Note provider assigned impact of the vulnerability
+        &quot;cvssScore&quot;: 3.14, # The CVSS score for this Vulnerability.
+      },
+      &quot;buildType&quot;: { # Note holding the version of the provider&#x27;s builder and the signature of # Build provenance type for a verifiable build.
+          # the provenance message in linked BuildDetails.
+        &quot;signature&quot;: { # Message encapsulating the signature of the verified build. # Signature of the build in Occurrences pointing to the Note containing this
+            # `BuilderDetails`.
+          &quot;keyId&quot;: &quot;A String&quot;, # An Id for the key used to sign. This could be either an Id for the key
+              # stored in `public_key` (such as the Id or fingerprint for a PGP key, or the
+              # CN for a cert), or a reference to an external key (such as a reference to a
+              # key in Cloud Key Management Service).
+          &quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
+          &quot;keyType&quot;: &quot;A String&quot;, # The type of the key, either stored in `public_key` or referenced in
+              # `key_id`
+          &quot;publicKey&quot;: &quot;A String&quot;, # Public key of the builder which can be used to verify that the related
+              # findings are valid and unchanged. If `key_type` is empty, this defaults
+              # to PEM encoded public keys.
+              #
+              # This field may be empty if `key_id` references an external key.
+              #
+              # For Cloud Build based signatures, this is a PEM encoded public
+              # key. To verify the Cloud Build signature, place the contents of
+              # this field into a file (public.pem). The signature field is base64-decoded
+              # into its binary representation in signature.bin, and the provenance bytes
+              # from `BuildDetails` are base64-decoded into a binary representation in
+              # signed.bin. OpenSSL can then verify the signature:
+              # `openssl sha256 -verify public.pem -signature signature.bin signed.bin`
+        },
+        &quot;builderVersion&quot;: &quot;A String&quot;, # Version of the builder which produced this Note.
+      },
+      &quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which kind of note is specified. This
+          # field can be used as a filter in list requests.
+      &quot;longDescription&quot;: &quot;A String&quot;, # A detailed description of this `Note`.
+      &quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
+        &quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
+          &quot;A String&quot;,
+        ],
+      },
+      &quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this note was last updated. This field can be used as
+          # a filter in list requests.
+      &quot;shortDescription&quot;: &quot;A String&quot;, # A one sentence description of this `Note`.
+      &quot;discovery&quot;: { # A note that indicates a type of analysis a provider would perform. This note # A note describing a provider/analysis type.
+          # exists in a provider&#x27;s project. A `Discovery` occurrence is created in a
+          # consumer&#x27;s project at the start of analysis. The occurrence&#x27;s operation will
+          # indicate the status of the analysis. Absence of an occurrence linked to this
+          # note for a resource indicates that analysis hasn&#x27;t started.
+        &quot;analysisKind&quot;: &quot;A String&quot;, # The kind of analysis that is handled by this discovery.
+      },
+      &quot;attestationAuthority&quot;: { # Note kind that represents a logical attestation &quot;role&quot; or &quot;authority&quot;.  For # A note describing an attestation role.
+          # example, an organization might have one `AttestationAuthority` for &quot;QA&quot; and
+          # one for &quot;build&quot;.  This Note is intended to act strictly as a grouping
+          # mechanism for the attached Occurrences (Attestations).  This grouping
+          # mechanism also provides a security boundary, since IAM ACLs gate the ability
+          # for a principle to attach an Occurrence to a given Note.  It also provides a
+          # single point of lookup to find all attached Attestation Occurrences, even if
+          # they don&#x27;t all live in the same project.
+        &quot;hint&quot;: { # This submessage provides human-readable hints about the purpose of the
+            # AttestationAuthority.  Because the name of a Note acts as its resource
+            # reference, it is important to disambiguate the canonical name of the Note
+            # (which might be a UUID for security purposes) from &quot;readable&quot; names more
+            # suitable for debug output.  Note that these hints should NOT be used to
+            # look up AttestationAuthorities in security sensitive contexts, such as when
+            # looking up Attestations to verify.
+          &quot;humanReadableName&quot;: &quot;A String&quot;, # The human readable name of this Attestation Authority, for example &quot;qa&quot;.
+        },
+      },
+      &quot;upgrade&quot;: { # An Upgrade Note represents a potential upgrade of a package to a given # A note describing an upgrade.
+          # version. For each package version combination (i.e. bash 4.0, bash 4.1,
+          # bash 4.1.2), there will be a Upgrade Note.
+        &quot;package&quot;: &quot;A String&quot;, # Required - The package this Upgrade is for.
+        &quot;version&quot;: { # Version contains structured information about the version of the package. # Required - The version of the package in machine + human readable form.
+            # For a discussion of this in Debian/Ubuntu:
+            # http://serverfault.com/questions/604541/debian-packages-version-convention
+            # For a discussion of this in Redhat/Fedora/Centos:
+            # http://blog.jasonantman.com/2014/07/how-yum-and-rpm-compare-versions/
+          &quot;name&quot;: &quot;A String&quot;, # The main part of the version name.
+          &quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
+          &quot;kind&quot;: &quot;A String&quot;, # Distinguish between sentinel MIN/MAX versions and normal versions.
+              # If kind is not NORMAL, then the other fields are ignored.
+          &quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
+        },
+        &quot;distributions&quot;: [ # Metadata about the upgrade for each specific operating system.
+          { # The Upgrade Distribution represents metadata about the Upgrade for each
+              # operating system (CPE). Some distributions have additional metadata around
+              # updates, classifying them into various categories and severities.
+            &quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the
+                # upstream operating system upgrade feed.
+            &quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See
+                # https://cpe.mitre.org/specification/.
+            &quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
+            &quot;cve&quot;: [ # The cve that would be resolved by this upgrade.
+              &quot;A String&quot;,
+            ],
+          },
+        ],
+      },
+    }</pre>
 </div>
 
 <div class="method">
@@ -1903,48 +1903,10 @@
         #
         # For a description of IAM and its features, see the
         # [IAM documentation](https://cloud.google.com/iam/docs/).
-      &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-          # prevent simultaneous updates of a policy from overwriting each other.
-          # It is strongly suggested that systems make use of the `etag` in the
-          # read-modify-write cycle to perform policy updates in order to avoid race
-          # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-          # systems are expected to put that etag in the request to `setIamPolicy` to
-          # ensure that their change will be applied to the same version of the policy.
-          #
-          # **Important:** If you use IAM Conditions, you must include the `etag` field
-          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-          # you to overwrite a version `3` policy with a version `1` policy, and all of
-          # the conditions in the version `3` policy are lost.
-      &quot;version&quot;: 42, # Specifies the format of the policy.
-          #
-          # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-          # are rejected.
-          #
-          # Any operation that affects conditional role bindings must specify version
-          # `3`. This requirement applies to the following operations:
-          #
-          # * Getting a policy that includes a conditional role binding
-          # * Adding a conditional role binding to a policy
-          # * Changing a conditional role binding in a policy
-          # * Removing any role binding, with or without a condition, from a policy
-          #   that includes conditions
-          #
-          # **Important:** If you use IAM Conditions, you must include the `etag` field
-          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-          # you to overwrite a version `3` policy with a version `1` policy, and all of
-          # the conditions in the version `3` policy are lost.
-          #
-          # If a policy does not include any conditions, operations on that policy may
-          # specify any valid version or leave the field unset.
-          #
-          # To learn which resources support conditions in their IAM policies, see the
-          # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
       &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
           # `condition` that determines how and when the `bindings` are applied. Each
           # of the `bindings` must contain at least one member.
         { # Associates `members` with a `role`.
-          &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-              # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
           &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
               #
               # If the condition evaluates to `true`, then this binding applies to the
@@ -1990,12 +1952,12 @@
             &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
                 # its purpose. This can be used e.g. in UIs which allow to enter the
                 # expression.
+            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+                # syntax.
             &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
                 # reporting, e.g. a file name and a position in the file.
             &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
                 # describes the expression, e.g. when hovered over it in a UI.
-            &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-                # syntax.
           },
           &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
               # `members` can have the following values:
@@ -2042,8 +2004,46 @@
               #
             &quot;A String&quot;,
           ],
+          &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+              # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         },
       ],
+      &quot;version&quot;: 42, # Specifies the format of the policy.
+          #
+          # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+          # are rejected.
+          #
+          # Any operation that affects conditional role bindings must specify version
+          # `3`. This requirement applies to the following operations:
+          #
+          # * Getting a policy that includes a conditional role binding
+          # * Adding a conditional role binding to a policy
+          # * Changing a conditional role binding in a policy
+          # * Removing any role binding, with or without a condition, from a policy
+          #   that includes conditions
+          #
+          # **Important:** If you use IAM Conditions, you must include the `etag` field
+          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+          # you to overwrite a version `3` policy with a version `1` policy, and all of
+          # the conditions in the version `3` policy are lost.
+          #
+          # If a policy does not include any conditions, operations on that policy may
+          # specify any valid version or leave the field unset.
+          #
+          # To learn which resources support conditions in their IAM policies, see the
+          # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+      &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+          # prevent simultaneous updates of a policy from overwriting each other.
+          # It is strongly suggested that systems make use of the `etag` in the
+          # read-modify-write cycle to perform policy updates in order to avoid race
+          # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+          # systems are expected to put that etag in the request to `setIamPolicy` to
+          # ensure that their change will be applied to the same version of the policy.
+          #
+          # **Important:** If you use IAM Conditions, you must include the `etag` field
+          # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+          # you to overwrite a version `3` policy with a version `1` policy, and all of
+          # the conditions in the version `3` policy are lost.
     },
   }
 
@@ -2122,48 +2122,10 @@
       #
       # For a description of IAM and its features, see the
       # [IAM documentation](https://cloud.google.com/iam/docs/).
-    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
-        # prevent simultaneous updates of a policy from overwriting each other.
-        # It is strongly suggested that systems make use of the `etag` in the
-        # read-modify-write cycle to perform policy updates in order to avoid race
-        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
-        # systems are expected to put that etag in the request to `setIamPolicy` to
-        # ensure that their change will be applied to the same version of the policy.
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-    &quot;version&quot;: 42, # Specifies the format of the policy.
-        #
-        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
-        # are rejected.
-        #
-        # Any operation that affects conditional role bindings must specify version
-        # `3`. This requirement applies to the following operations:
-        #
-        # * Getting a policy that includes a conditional role binding
-        # * Adding a conditional role binding to a policy
-        # * Changing a conditional role binding in a policy
-        # * Removing any role binding, with or without a condition, from a policy
-        #   that includes conditions
-        #
-        # **Important:** If you use IAM Conditions, you must include the `etag` field
-        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
-        # you to overwrite a version `3` policy with a version `1` policy, and all of
-        # the conditions in the version `3` policy are lost.
-        #
-        # If a policy does not include any conditions, operations on that policy may
-        # specify any valid version or leave the field unset.
-        #
-        # To learn which resources support conditions in their IAM policies, see the
-        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
     &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
         # `condition` that determines how and when the `bindings` are applied. Each
         # of the `bindings` must contain at least one member.
       { # Associates `members` with a `role`.
-        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
-            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
         &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
             #
             # If the condition evaluates to `true`, then this binding applies to the
@@ -2209,12 +2171,12 @@
           &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
               # its purpose. This can be used e.g. in UIs which allow to enter the
               # expression.
+          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
+              # syntax.
           &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
               # reporting, e.g. a file name and a position in the file.
           &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
               # describes the expression, e.g. when hovered over it in a UI.
-          &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
-              # syntax.
         },
         &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
             # `members` can have the following values:
@@ -2261,8 +2223,46 @@
             #
           &quot;A String&quot;,
         ],
+        &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
+            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
       },
     ],
+    &quot;version&quot;: 42, # Specifies the format of the policy.
+        #
+        # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+        # are rejected.
+        #
+        # Any operation that affects conditional role bindings must specify version
+        # `3`. This requirement applies to the following operations:
+        #
+        # * Getting a policy that includes a conditional role binding
+        # * Adding a conditional role binding to a policy
+        # * Changing a conditional role binding in a policy
+        # * Removing any role binding, with or without a condition, from a policy
+        #   that includes conditions
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
+        #
+        # If a policy does not include any conditions, operations on that policy may
+        # specify any valid version or leave the field unset.
+        #
+        # To learn which resources support conditions in their IAM policies, see the
+        # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+    &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
+        # prevent simultaneous updates of a policy from overwriting each other.
+        # It is strongly suggested that systems make use of the `etag` in the
+        # read-modify-write cycle to perform policy updates in order to avoid race
+        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+        # systems are expected to put that etag in the request to `setIamPolicy` to
+        # ensure that their change will be applied to the same version of the policy.
+        #
+        # **Important:** If you use IAM Conditions, you must include the `etag` field
+        # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+        # you to overwrite a version `3` policy with a version `1` policy, and all of
+        # the conditions in the version `3` policy are lost.
   }</pre>
 </div>