blob: fc8b0c220d186c360c4e46f094d94c62d4f764da [file] [log] [blame]
Bu Sun Kim715bd7f2019-06-14 16:50:42 -07001<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5 margin: 0;
6 padding: 0;
7 border: 0;
8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
13}
14
15body {
16 font-size: 13px;
17 padding: 1em;
18}
19
20h1 {
21 font-size: 26px;
22 margin-bottom: 1em;
23}
24
25h2 {
26 font-size: 24px;
27 margin-bottom: 1em;
28}
29
30h3 {
31 font-size: 20px;
32 margin-bottom: 1em;
33 margin-top: 1em;
34}
35
36pre, code {
37 line-height: 1.5;
38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42 margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46 font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50 border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54 margin-top: 0.5em;
55}
56
57.firstline {
58 margin-left: 2 em;
59}
60
61.method {
62 margin-top: 1em;
63 border: solid 1px #CCC;
64 padding: 1em;
65 background: #EEE;
66}
67
68.details {
69 font-weight: bold;
70 font-size: 14px;
71}
72
73</style>
74
75<h1><a href="containeranalysis_v1beta1.html">Container Analysis API</a> . <a href="containeranalysis_v1beta1.projects.html">projects</a> . <a href="containeranalysis_v1beta1.projects.notes.html">notes</a> . <a href="containeranalysis_v1beta1.projects.notes.occurrences.html">occurrences</a></h1>
76<h2>Instance Methods</h2>
77<p class="toc_element">
78 <code><a href="#list">list(name, pageToken=None, x__xgafv=None, pageSize=None, filter=None)</a></code></p>
79<p class="firstline">Lists occurrences referencing the specified note. Provider projects can use</p>
80<p class="toc_element">
81 <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
82<p class="firstline">Retrieves the next page of results.</p>
83<h3>Method Details</h3>
84<div class="method">
85 <code class="details" id="list">list(name, pageToken=None, x__xgafv=None, pageSize=None, filter=None)</code>
86 <pre>Lists occurrences referencing the specified note. Provider projects can use
87this method to get all occurrences across consumer projects referencing the
88specified note.
89
90Args:
91 name: string, The name of the note to list occurrences for in the form of
92`projects/[PROVIDER_ID]/notes/[NOTE_ID]`. (required)
93 pageToken: string, Token to provide to skip to a particular spot in the list.
94 x__xgafv: string, V1 error format.
95 Allowed values
96 1 - v1 error format
97 2 - v2 error format
98 pageSize: integer, Number of occurrences to return in the list.
99 filter: string, The filter expression.
100
101Returns:
102 An object of the form:
103
104 { # Response for listing occurrences for a note.
105 "nextPageToken": "A String", # Token to provide to skip to a particular spot in the list.
106 "occurrences": [ # The occurrences attached to the specified note.
107 { # An instance of an analysis type that has been found on a resource.
108 "kind": "A String", # Output only. This explicitly denotes which of the occurrence details are
109 # specified. This field can be used as a filter in list requests.
110 "resource": { # An entity that can have metadata. For example, a Docker image. # Required. Immutable. The resource for which the occurrence applies.
111 "contentHash": { # Container message for hash values. # Deprecated, do not use. Use uri instead.
112 #
113 # The hash of the resource content. For example, the Docker digest.
114 "type": "A String", # Required. The type of hash that was performed.
115 "value": "A String", # Required. The hash value.
116 },
117 "uri": "A String", # Required. The unique URI of the resource. For example,
118 # `https://gcr.io/project/image@sha256:foo` for a Docker image.
119 "name": "A String", # Deprecated, do not use. Use uri instead.
120 #
121 # The name of the resource. For example, the name of a Docker image -
122 # "Debian".
123 },
124 "name": "A String", # Output only. The name of the occurrence in the form of
125 # `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
126 "vulnerability": { # Details of a vulnerability Occurrence. # Describes a security vulnerability.
127 "cvssScore": 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a
128 # scale of 0-10 where 0 indicates low severity and 10 indicates high
129 # severity.
130 "severity": "A String", # Output only. The note provider assigned Severity of the vulnerability.
131 "type": "A String", # The type of package; whether native or non native(ruby gems, node.js
132 # packages etc)
133 "effectiveSeverity": "A String", # The distro assigned severity for this vulnerability when it is
134 # available, and note provider assigned severity when distro has not yet
135 # assigned a severity for this vulnerability.
136 "relatedUrls": [ # Output only. URLs related to this vulnerability.
137 { # Metadata for any related URL information.
138 "url": "A String", # Specific URL associated with the resource.
139 "label": "A String", # Label to describe usage of the URL.
140 },
141 ],
142 "packageIssue": [ # Required. The set of affected locations and their fixes (if available)
143 # within the associated resource.
144 { # This message wraps a location affected by a vulnerability and its
145 # associated fix (if one is available).
146 "severityName": "A String", # Deprecated, use Details.effective_severity instead
147 # The severity (e.g., distro assigned severity) for this vulnerability.
148 "affectedLocation": { # The location of the vulnerability. # Required. The location of the vulnerability.
149 "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
150 # format. Examples include distro or storage location for vulnerable jar.
151 "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
152 "epoch": 42, # Used to correct mistakes in the version numbering scheme.
153 "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
154 # versions.
155 "name": "A String", # Required only when version kind is NORMAL. The main part of the version
156 # name.
157 "revision": "A String", # The iteration of the package build from the above version.
158 },
159 "package": "A String", # Required. The package being described.
160 },
161 "fixedLocation": { # The location of the vulnerability. # The location of the available fix for vulnerability.
162 "cpeUri": "A String", # Required. The CPE URI in [cpe format](https://cpe.mitre.org/specification/)
163 # format. Examples include distro or storage location for vulnerable jar.
164 "version": { # Version contains structured information about the version of a package. # Required. The version of the package being described.
165 "epoch": 42, # Used to correct mistakes in the version numbering scheme.
166 "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
167 # versions.
168 "name": "A String", # Required only when version kind is NORMAL. The main part of the version
169 # name.
170 "revision": "A String", # The iteration of the package build from the above version.
171 },
172 "package": "A String", # Required. The package being described.
173 },
174 },
175 ],
176 "longDescription": "A String", # Output only. A detailed description of this vulnerability.
177 "shortDescription": "A String", # Output only. A one sentence description of this vulnerability.
178 },
179 "updateTime": "A String", # Output only. The time this occurrence was last updated.
180 "discovered": { # Details of a discovery occurrence. # Describes when a resource was discovered.
181 "discovered": { # Provides information about the analysis status of a discovered resource. # Required. Analysis status for the discovered resource.
182 "lastAnalysisTime": "A String", # The last time continuous analysis was done for this resource.
183 # Deprecated, do not use.
184 "analysisStatus": "A String", # The status of discovery for the resource.
185 "continuousAnalysis": "A String", # Whether the resource is continuously analyzed.
186 "analysisStatusError": { # The `Status` type defines a logical error model that is suitable for # When an error is encountered this will contain a LocalizedMessage under
187 # details to show to the user. The LocalizedMessage is output only and
188 # populated by the API.
189 # different programming environments, including REST APIs and RPC APIs. It is
190 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
191 # three pieces of data: error code, error message, and error details.
192 #
193 # You can find out more about this error model and how to work with it in the
194 # [API Design Guide](https://cloud.google.com/apis/design/errors).
195 "message": "A String", # A developer-facing error message, which should be in English. Any
196 # user-facing error message should be localized and sent in the
197 # google.rpc.Status.details field, or localized by the client.
198 "code": 42, # The status code, which should be an enum value of google.rpc.Code.
199 "details": [ # A list of messages that carry the error details. There is a common set of
200 # message types for APIs to use.
201 {
202 "a_key": "", # Properties of the object. Contains field @type with type URL.
203 },
204 ],
205 },
206 },
207 },
208 "attestation": { # Details of an attestation occurrence. # Describes an attestation of an artifact.
209 "attestation": { # Occurrence that represents a single "attestation". The authenticity of an # Required. Attestation for the resource.
210 # attestation can be verified using the attached signature. If the verifier
211 # trusts the public key of the signer, then verifying the signature is
212 # sufficient to establish trust. In this circumstance, the authority to which
213 # this attestation is attached is primarily useful for look-up (how to find
214 # this attestation if you already know the authority and artifact to be
215 # verified) and intent (which authority was this attestation intended to sign
216 # for).
217 "pgpSignedAttestation": { # An attestation wrapper with a PGP-compatible signature. This message only # A PGP signed attestation.
218 # supports `ATTACHED` signatures, where the payload that is signed is included
219 # alongside the signature itself in the same file.
220 "pgpKeyId": "A String", # The cryptographic fingerprint of the key used to generate the signature,
221 # as output by, e.g. `gpg --list-keys`. This should be the version 4, full
222 # 160-bit fingerprint, expressed as a 40 character hexidecimal string. See
223 # https://tools.ietf.org/html/rfc4880#section-12.2 for details.
224 # Implementations may choose to acknowledge "LONG", "SHORT", or other
225 # abbreviated key IDs, but only the full fingerprint is guaranteed to work.
226 # In gpg, the full fingerprint can be retrieved from the `fpr` field
227 # returned when calling --list-keys with --with-colons. For example:
228 # ```
229 # gpg --with-colons --with-fingerprint --force-v4-certs \
230 # --list-keys attester@example.com
231 # tru::1:1513631572:0:3:1:5
232 # pub:...<SNIP>...
233 # fpr:::::::::24FF6481B76AC91E66A00AC657A93A81EF3AE6FB:
234 # ```
235 # Above, the fingerprint is `24FF6481B76AC91E66A00AC657A93A81EF3AE6FB`.
236 "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
237 # The verifier must ensure that the provided type is one that the verifier
238 # supports, and that the attestation payload is a valid instantiation of that
239 # type (for example by validating a JSON schema).
240 "signature": "A String", # Required. The raw content of the signature, as output by GNU Privacy Guard
241 # (GPG) or equivalent. Since this message only supports attached signatures,
242 # the payload that was signed must be attached. While the signature format
243 # supported is dependent on the verification implementation, currently only
244 # ASCII-armored (`--armor` to gpg), non-clearsigned (`--sign` rather than
245 # `--clearsign` to gpg) are supported. Concretely, `gpg --sign --armor
246 # --output=signature.gpg payload.json` will create the signature content
247 # expected in this field in `signature.gpg` for the `payload.json`
248 # attestation payload.
249 },
250 "genericSignedAttestation": { # An attestation wrapper that uses the Grafeas `Signature` message.
251 # This attestation must define the `serialized_payload` that the `signatures`
252 # verify and any metadata necessary to interpret that plaintext. The
253 # signatures should always be over the `serialized_payload` bytestring.
254 "signatures": [ # One or more signatures over `serialized_payload`. Verifier implementations
255 # should consider this attestation message verified if at least one
256 # `signature` verifies `serialized_payload`. See `Signature` in common.proto
257 # for more details on signature structure and verification.
258 { # Verifiers (e.g. Kritis implementations) MUST verify signatures
259 # with respect to the trust anchors defined in policy (e.g. a Kritis policy).
260 # Typically this means that the verifier has been configured with a map from
261 # `public_key_id` to public key material (and any required parameters, e.g.
262 # signing algorithm).
263 #
264 # In particular, verification implementations MUST NOT treat the signature
265 # `public_key_id` as anything more than a key lookup hint. The `public_key_id`
266 # DOES NOT validate or authenticate a public key; it only provides a mechanism
267 # for quickly selecting a public key ALREADY CONFIGURED on the verifier through
268 # a trusted channel. Verification implementations MUST reject signatures in any
269 # of the following circumstances:
270 # * The `public_key_id` is not recognized by the verifier.
271 # * The public key that `public_key_id` refers to does not verify the
272 # signature with respect to the payload.
273 #
274 # The `signature` contents SHOULD NOT be "attached" (where the payload is
275 # included with the serialized `signature` bytes). Verifiers MUST ignore any
276 # "attached" payload and only verify signatures with respect to explicitly
277 # provided payload (e.g. a `payload` field on the proto message that holds
278 # this Signature, or the canonical serialization of the proto message that
279 # holds this signature).
280 "publicKeyId": "A String", # The identifier for the public key that verifies this signature.
281 # * The `public_key_id` is required.
282 # * The `public_key_id` MUST be an RFC3986 conformant URI.
283 # * When possible, the `public_key_id` SHOULD be an immutable reference,
284 # such as a cryptographic digest.
285 #
286 # Examples of valid `public_key_id`s:
287 #
288 # OpenPGP V4 public key fingerprint:
289 # * "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA"
290 # See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
291 # details on this scheme.
292 #
293 # RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER
294 # serialization):
295 # * "ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU"
296 # * "nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
297 "signature": "A String", # The content of the signature, an opaque bytestring.
298 # The payload that this signature verifies MUST be unambiguously provided
299 # with the Signature during verification. A wrapper message might provide
300 # the payload explicitly. Alternatively, a message might have a canonical
301 # serialization that can always be unambiguously computed to derive the
302 # payload.
303 },
304 ],
305 "contentType": "A String", # Type (for example schema) of the attestation payload that was signed.
306 # The verifier must ensure that the provided type is one that the verifier
307 # supports, and that the attestation payload is a valid instantiation of that
308 # type (for example by validating a JSON schema).
309 "serializedPayload": "A String", # The serialized payload that is verified by one or more `signatures`.
310 # The encoding and semantic meaning of this payload must match what is set in
311 # `content_type`.
312 },
313 },
314 },
315 "build": { # Details of a build occurrence. # Describes a verifiable build.
316 "provenance": { # Provenance of a build. Contains all information needed to verify the full # Required. The actual provenance for the build.
317 # details about the build from source to completion.
318 "commands": [ # Commands requested by the build.
319 { # Command describes a step performed as part of the build pipeline.
320 "waitFor": [ # The ID(s) of the command(s) that this command depends on.
321 "A String",
322 ],
323 "name": "A String", # Required. Name of the command, as presented on the command line, or if the
324 # command is packaged as a Docker container, as presented to `docker pull`.
325 "args": [ # Command-line arguments used when executing this command.
326 "A String",
327 ],
328 "env": [ # Environment variables set before running this command.
329 "A String",
330 ],
331 "id": "A String", # Optional unique identifier for this command, used in wait_for to reference
332 # this command as a dependency.
333 "dir": "A String", # Working directory (relative to project source root) used when running this
334 # command.
335 },
336 ],
337 "sourceProvenance": { # Source describes the location of the source used for the build. # Details of the Source input to the build.
338 "fileHashes": { # Hash(es) of the build source, which can be used to verify that the original
339 # source integrity was maintained in the build.
340 #
341 # The keys to this map are file paths used as build source and the values
342 # contain the hash values for those files.
343 #
344 # If the build source came in a single package such as a gzipped tarfile
345 # (.tar.gz), the FileHash will be for the single path to that file.
346 "a_key": { # Container message for hashes of byte content of files, used in source
347 # messages to verify integrity of source input to the build.
348 "fileHash": [ # Required. Collection of file hashes.
349 { # Container message for hash values.
350 "type": "A String", # Required. The type of hash that was performed.
351 "value": "A String", # Required. The hash value.
352 },
353 ],
354 },
355 },
356 "artifactStorageSourceUri": "A String", # If provided, the input binary artifacts for the build came from this
357 # location.
358 "additionalContexts": [ # If provided, some of the source code used for the build may be found in
359 # these locations, in the case where the source repository had multiple
360 # remotes or submodules. This list will not include the context specified in
361 # the context field.
362 { # A SourceContext is a reference to a tree of files. A SourceContext together
363 # with a path point to a unique revision of a single file or directory.
364 "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
365 # repository (e.g., GitHub).
366 "url": "A String", # Git repository URL.
367 "revisionId": "A String", # Git commit hash.
368 },
369 "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
370 # Source Repo.
371 "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
372 "kind": "A String", # The alias kind.
373 "name": "A String", # The alias name.
374 },
375 "revisionId": "A String", # A revision ID.
376 "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
377 "uid": "A String", # A server-assigned, globally unique identifier.
378 "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
379 # winged-cargo-31) and a repo name within that project.
380 "projectId": "A String", # The ID of the project.
381 "repoName": "A String", # The name of the repo. Leave empty for the default repo.
382 },
383 },
384 },
385 "labels": { # Labels with user defined metadata.
386 "a_key": "A String",
387 },
388 "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
389 "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
390 "kind": "A String", # The alias kind.
391 "name": "A String", # The alias name.
392 },
393 "revisionId": "A String", # A revision (commit) ID.
394 "hostUri": "A String", # The URI of a running Gerrit instance.
395 "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
396 # "project/subproject" is a valid project name. The "repo name" is the
397 # hostURI/project.
398 },
399 },
400 ],
401 "context": { # A SourceContext is a reference to a tree of files. A SourceContext together # If provided, the source code used for the build came from this location.
402 # with a path point to a unique revision of a single file or directory.
403 "git": { # A GitSourceContext denotes a particular revision in a third party Git # A SourceContext referring to any third party Git repo (e.g., GitHub).
404 # repository (e.g., GitHub).
405 "url": "A String", # Git repository URL.
406 "revisionId": "A String", # Git commit hash.
407 },
408 "cloudRepo": { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud # A SourceContext referring to a revision in a Google Cloud Source Repo.
409 # Source Repo.
410 "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
411 "kind": "A String", # The alias kind.
412 "name": "A String", # The alias name.
413 },
414 "revisionId": "A String", # A revision ID.
415 "repoId": { # A unique identifier for a Cloud Repo. # The ID of the repo.
416 "uid": "A String", # A server-assigned, globally unique identifier.
417 "projectRepoId": { # Selects a repo using a Google Cloud Platform project ID (e.g., # A combination of a project ID and a repo name.
418 # winged-cargo-31) and a repo name within that project.
419 "projectId": "A String", # The ID of the project.
420 "repoName": "A String", # The name of the repo. Leave empty for the default repo.
421 },
422 },
423 },
424 "labels": { # Labels with user defined metadata.
425 "a_key": "A String",
426 },
427 "gerrit": { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
428 "aliasContext": { # An alias to a repo revision. # An alias, which may be a branch or tag.
429 "kind": "A String", # The alias kind.
430 "name": "A String", # The alias name.
431 },
432 "revisionId": "A String", # A revision (commit) ID.
433 "hostUri": "A String", # The URI of a running Gerrit instance.
434 "gerritProject": "A String", # The full project name within the host. Projects may be nested, so
435 # "project/subproject" is a valid project name. The "repo name" is the
436 # hostURI/project.
437 },
438 },
439 },
440 "buildOptions": { # Special options applied to this build. This is a catch-all field where
441 # build providers can enter any desired additional details.
442 "a_key": "A String",
443 },
444 "creator": "A String", # E-mail address of the user who initiated this build. Note that this was the
445 # user's e-mail address at the time the build was initiated; this address may
446 # not represent the same end-user for all time.
447 "projectId": "A String", # ID of the project.
448 "builderVersion": "A String", # Version string of the builder at the time this build was executed.
449 "createTime": "A String", # Time at which the build was created.
450 "builtArtifacts": [ # Output of the build.
451 { # Artifact describes a build product.
452 "checksum": "A String", # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a
453 # container.
454 "id": "A String", # Artifact ID, if any; for container images, this will be a URL by digest
455 # like `gcr.io/projectID/imagename@sha256:123456`.
456 "names": [ # Related artifact names. This may be the path to a binary or jar file, or in
457 # the case of a container build, the name used to push the container image to
458 # Google Container Registry, as presented to `docker push`. Note that a
459 # single Artifact ID can have multiple names, for example if two tags are
460 # applied to one image.
461 "A String",
462 ],
463 },
464 ],
465 "triggerId": "A String", # Trigger identifier if the build was triggered automatically; empty if not.
466 "startTime": "A String", # Time at which execution of the build was started.
467 "endTime": "A String", # Time at which execution of the build was finished.
468 "id": "A String", # Required. Unique identifier of the build.
469 "logsUri": "A String", # URI where any logs for this provenance were written.
470 },
471 "provenanceBytes": "A String", # Serialized JSON representation of the provenance, used in generating the
472 # build signature in the corresponding build note. After verifying the
473 # signature, `provenance_bytes` can be unmarshalled and compared to the
474 # provenance to confirm that it is unchanged. A base64-encoded string
475 # representation of the provenance bytes is used for the signature in order
476 # to interoperate with openssl which expects this format for signature
477 # verification.
478 #
479 # The serialized form is captured both to avoid ambiguity in how the
480 # provenance is marshalled to json as well to prevent incompatibilities with
481 # future changes.
482 },
483 "deployment": { # Details of a deployment occurrence. # Describes the deployment of an artifact on a runtime.
484 "deployment": { # The period during which some deployable was active in a runtime. # Required. Deployment history for the resource.
485 "resourceUri": [ # Output only. Resource URI for the artifact being deployed taken from
486 # the deployable field with the same name.
487 "A String",
488 ],
489 "userEmail": "A String", # Identity of the user that triggered this deployment.
490 "address": "A String", # Address of the runtime element hosting this deployment.
491 "platform": "A String", # Platform hosting this deployment.
492 "deployTime": "A String", # Required. Beginning of the lifetime of this deployment.
493 "undeployTime": "A String", # End of the lifetime of this deployment.
494 "config": "A String", # Configuration used to create this deployment.
495 },
496 },
497 "remediation": "A String", # A description of actions that can be taken to remedy the note.
498 "installation": { # Details of a package occurrence. # Describes the installation of a package on the linked resource.
499 "installation": { # This represents how a particular software package may be installed on a # Required. Where the package was installed.
500 # system.
501 "location": [ # Required. All of the places within the filesystem versions of this package
502 # have been found.
503 { # An occurrence of a particular package installation found within a system's
504 # filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
505 "path": "A String", # The path from which we gathered that this package/version is installed.
506 "cpeUri": "A String", # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
507 # denoting the package manager version distributing a package.
508 "version": { # Version contains structured information about the version of a package. # The version installed at this location.
509 "epoch": 42, # Used to correct mistakes in the version numbering scheme.
510 "kind": "A String", # Required. Distinguishes between sentinel MIN/MAX versions and normal
511 # versions.
512 "name": "A String", # Required only when version kind is NORMAL. The main part of the version
513 # name.
514 "revision": "A String", # The iteration of the package build from the above version.
515 },
516 },
517 ],
518 "name": "A String", # Output only. The name of the installed package.
519 },
520 },
521 "createTime": "A String", # Output only. The time this occurrence was created.
522 "derivedImage": { # Details of an image occurrence. # Describes how this resource derives from the basis in the associated
523 # note.
524 "derivedImage": { # Derived describes the derived image portion (Occurrence) of the DockerImage # Required. Immutable. The child image derived from the base image.
525 # relationship. This image would be produced from a Dockerfile with FROM
526 # <DockerImage.Basis in attached Note>.
527 "distance": 42, # Output only. The number of layers by which this image differs from the
528 # associated image basis.
529 "baseResourceUrl": "A String", # Output only. This contains the base image URL for the derived image
530 # occurrence.
531 "layerInfo": [ # This contains layer-specific metadata, if populated it has length
532 # "distance" and is ordered with [distance] being the layer immediately
533 # following the base image and [1] being the final layer.
534 { # Layer holds metadata specific to a layer of a Docker image.
535 "arguments": "A String", # The recovered arguments to the Dockerfile directive.
536 "directive": "A String", # Required. The recovered Dockerfile directive used to construct this layer.
537 },
538 ],
539 "fingerprint": { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
540 "v1Name": "A String", # Required. The layer ID of the final layer in the Docker image's v1
541 # representation.
542 "v2Name": "A String", # Output only. The name of the image's v2 blobs computed via:
543 # [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1])
544 # Only the name of the final blob is kept.
545 "v2Blob": [ # Required. The ordered list of v2 blobs that represent a given image.
546 "A String",
547 ],
548 },
549 },
550 },
551 "noteName": "A String", # Required. Immutable. The analysis note associated with this occurrence, in
552 # the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be
553 # used as a filter in list requests.
554 },
555 ],
556 }</pre>
557</div>
558
559<div class="method">
560 <code class="details" id="list_next">list_next(previous_request, previous_response)</code>
561 <pre>Retrieves the next page of results.
562
563Args:
564 previous_request: The request for the previous page. (required)
565 previous_response: The response from the request for the previous page. (required)
566
567Returns:
568 A request object that you can call 'execute()' on to request the next
569 page. Returns None if there are no more items in the collection.
570 </pre>
571</div>
572
573</body></html>