Skip to content

Commit e8a2008

Browse files
feat(ondemandscanning): update the api
#### ondemandscanning:v1 The following keys were added: - schemas.DiscoveryOccurrence.properties.archiveTime (Total Keys: 3) #### ondemandscanning:v1beta1 The following keys were added: - schemas.DiscoveryOccurrence.properties.archiveTime (Total Keys: 3)
1 parent be927c3 commit e8a2008

File tree

4 files changed

+42
-28
lines changed

4 files changed

+42
-28
lines changed

docs/dyn/ondemandscanning_v1.projects.locations.scans.vulnerabilities.html

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -159,8 +159,8 @@ <h3>Method Details</h3>
159159
},
160160
},
161161
&quot;intotoStatement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;. # In-toto Statement representation as defined in spec. The intoto_statement can contain any type of provenance. The serialized payload of the statement can be stored and signed in the Occurrence&#x27;s envelope.
162-
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
163-
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
162+
&quot;_type&quot;: &quot;A String&quot;, # Always `https://in-toto.io/Statement/v0.1`.
163+
&quot;predicateType&quot;: &quot;A String&quot;, # `https://slsa.dev/provenance/v0.1` for SlsaProvenance.
164164
&quot;provenance&quot;: {
165165
&quot;builderConfig&quot;: { # required
166166
&quot;id&quot;: &quot;A String&quot;,
@@ -232,7 +232,7 @@ <h3>Method Details</h3>
232232
},
233233
&quot;subject&quot;: [
234234
{
235-
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
235+
&quot;digest&quot;: { # `&quot;&quot;: &quot;&quot;` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
236236
&quot;a_key&quot;: &quot;A String&quot;,
237237
},
238238
&quot;name&quot;: &quot;A String&quot;,
@@ -362,9 +362,9 @@ <h3>Method Details</h3>
362362
&quot;compliance&quot;: { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes a compliance violation on a linked resource.
363363
&quot;nonComplianceReason&quot;: &quot;A String&quot;,
364364
&quot;nonCompliantFiles&quot;: [
365-
{ # Details about files that caused a compliance check to fail.
365+
{ # Details about files that caused a compliance check to fail. display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;.
366366
&quot;displayCommand&quot;: &quot;A String&quot;, # Command to display the non-compliant files.
367-
&quot;path&quot;: &quot;A String&quot;, # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;. Empty if `display_command` is set.
367+
&quot;path&quot;: &quot;A String&quot;, # Empty if `display_command` is set.
368368
&quot;reason&quot;: &quot;A String&quot;, # Explains why a file is non compliant for a CIS check.
369369
},
370370
],
@@ -392,6 +392,7 @@ <h3>Method Details</h3>
392392
],
393393
&quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any user-facing error message should be localized and sent in the google.rpc.Status.details field, or localized by the client.
394394
},
395+
&quot;archiveTime&quot;: &quot;A String&quot;, # Output only. The time occurrences related to this discovery occurrence were archived.
395396
&quot;continuousAnalysis&quot;: &quot;A String&quot;, # Whether the resource is continuously analyzed.
396397
&quot;cpe&quot;: &quot;A String&quot;, # The CPE of the resource being scanned.
397398
&quot;lastScanTime&quot;: &quot;A String&quot;, # The last time this resource was scanned.
@@ -408,8 +409,8 @@ <h3>Method Details</h3>
408409
],
409410
},
410411
&quot;statement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;.
411-
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
412-
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
412+
&quot;_type&quot;: &quot;A String&quot;, # Always `https://in-toto.io/Statement/v0.1`.
413+
&quot;predicateType&quot;: &quot;A String&quot;, # `https://slsa.dev/provenance/v0.1` for SlsaProvenance.
413414
&quot;provenance&quot;: {
414415
&quot;builderConfig&quot;: { # required
415416
&quot;id&quot;: &quot;A String&quot;,
@@ -481,7 +482,7 @@ <h3>Method Details</h3>
481482
},
482483
&quot;subject&quot;: [
483484
{
484-
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
485+
&quot;digest&quot;: { # `&quot;&quot;: &quot;&quot;` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
485486
&quot;a_key&quot;: &quot;A String&quot;,
486487
},
487488
&quot;name&quot;: &quot;A String&quot;,

docs/dyn/ondemandscanning_v1beta1.projects.locations.scans.vulnerabilities.html

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -159,8 +159,8 @@ <h3>Method Details</h3>
159159
},
160160
},
161161
&quot;intotoStatement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;. # In-toto Statement representation as defined in spec. The intoto_statement can contain any type of provenance. The serialized payload of the statement can be stored and signed in the Occurrence&#x27;s envelope.
162-
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
163-
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
162+
&quot;_type&quot;: &quot;A String&quot;, # Always `https://in-toto.io/Statement/v0.1`.
163+
&quot;predicateType&quot;: &quot;A String&quot;, # `https://slsa.dev/provenance/v0.1` for SlsaProvenance.
164164
&quot;provenance&quot;: {
165165
&quot;builderConfig&quot;: { # required
166166
&quot;id&quot;: &quot;A String&quot;,
@@ -232,7 +232,7 @@ <h3>Method Details</h3>
232232
},
233233
&quot;subject&quot;: [
234234
{
235-
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
235+
&quot;digest&quot;: { # `&quot;&quot;: &quot;&quot;` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
236236
&quot;a_key&quot;: &quot;A String&quot;,
237237
},
238238
&quot;name&quot;: &quot;A String&quot;,
@@ -362,9 +362,9 @@ <h3>Method Details</h3>
362362
&quot;compliance&quot;: { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes a compliance violation on a linked resource.
363363
&quot;nonComplianceReason&quot;: &quot;A String&quot;,
364364
&quot;nonCompliantFiles&quot;: [
365-
{ # Details about files that caused a compliance check to fail.
365+
{ # Details about files that caused a compliance check to fail. display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;.
366366
&quot;displayCommand&quot;: &quot;A String&quot;, # Command to display the non-compliant files.
367-
&quot;path&quot;: &quot;A String&quot;, # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;. Empty if `display_command` is set.
367+
&quot;path&quot;: &quot;A String&quot;, # Empty if `display_command` is set.
368368
&quot;reason&quot;: &quot;A String&quot;, # Explains why a file is non compliant for a CIS check.
369369
},
370370
],
@@ -392,6 +392,7 @@ <h3>Method Details</h3>
392392
],
393393
&quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any user-facing error message should be localized and sent in the google.rpc.Status.details field, or localized by the client.
394394
},
395+
&quot;archiveTime&quot;: &quot;A String&quot;, # Output only. The time occurrences related to this discovery occurrence were archived.
395396
&quot;continuousAnalysis&quot;: &quot;A String&quot;, # Whether the resource is continuously analyzed.
396397
&quot;cpe&quot;: &quot;A String&quot;, # The CPE of the resource being scanned.
397398
&quot;lastScanTime&quot;: &quot;A String&quot;, # The last time this resource was scanned.
@@ -408,8 +409,8 @@ <h3>Method Details</h3>
408409
],
409410
},
410411
&quot;statement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;.
411-
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
412-
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
412+
&quot;_type&quot;: &quot;A String&quot;, # Always `https://in-toto.io/Statement/v0.1`.
413+
&quot;predicateType&quot;: &quot;A String&quot;, # `https://slsa.dev/provenance/v0.1` for SlsaProvenance.
413414
&quot;provenance&quot;: {
414415
&quot;builderConfig&quot;: { # required
415416
&quot;id&quot;: &quot;A String&quot;,
@@ -481,7 +482,7 @@ <h3>Method Details</h3>
481482
},
482483
&quot;subject&quot;: [
483484
{
484-
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
485+
&quot;digest&quot;: { # `&quot;&quot;: &quot;&quot;` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
485486
&quot;a_key&quot;: &quot;A String&quot;,
486487
},
487488
&quot;name&quot;: &quot;A String&quot;,

googleapiclient/discovery_cache/documents/ondemandscanning.v1.json

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@
339339
}
340340
}
341341
},
342-
"revision": "20211206",
342+
"revision": "20220107",
343343
"rootUrl": "https://ondemandscanning.googleapis.com/",
344344
"schemas": {
345345
"AliasContext": {
@@ -951,6 +951,12 @@
951951
"$ref": "Status",
952952
"description": "When an error is encountered this will contain a LocalizedMessage under details to show to the user. The LocalizedMessage is output only and populated by the API."
953953
},
954+
"archiveTime": {
955+
"description": "Output only. The time occurrences related to this discovery occurrence were archived.",
956+
"format": "google-datetime",
957+
"readOnly": true,
958+
"type": "string"
959+
},
954960
"continuousAnalysis": {
955961
"description": "Whether the resource is continuously analyzed.",
956962
"enum": [
@@ -1178,11 +1184,11 @@
11781184
"id": "InTotoStatement",
11791185
"properties": {
11801186
"_type": {
1181-
"description": "Always \"https://in-toto.io/Statement/v0.1\".",
1187+
"description": "Always `https://in-toto.io/Statement/v0.1`.",
11821188
"type": "string"
11831189
},
11841190
"predicateType": {
1185-
"description": "\"https://slsa.dev/provenance/v0.1\" for SlsaProvenance.",
1191+
"description": "`https://slsa.dev/provenance/v0.1` for SlsaProvenance.",
11861192
"type": "string"
11871193
},
11881194
"provenance": {
@@ -1325,15 +1331,15 @@
13251331
"type": "object"
13261332
},
13271333
"NonCompliantFile": {
1328-
"description": "Details about files that caused a compliance check to fail.",
1334+
"description": "Details about files that caused a compliance check to fail. display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'.",
13291335
"id": "NonCompliantFile",
13301336
"properties": {
13311337
"displayCommand": {
13321338
"description": "Command to display the non-compliant files.",
13331339
"type": "string"
13341340
},
13351341
"path": {
1336-
"description": "display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.",
1342+
"description": "Empty if `display_command` is set.",
13371343
"type": "string"
13381344
},
13391345
"reason": {
@@ -1919,7 +1925,7 @@
19191925
"additionalProperties": {
19201926
"type": "string"
19211927
},
1922-
"description": "\"\": \"\" Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet",
1928+
"description": "`\"\": \"\"` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet",
19231929
"type": "object"
19241930
},
19251931
"name": {

googleapiclient/discovery_cache/documents/ondemandscanning.v1beta1.json

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@
339339
}
340340
}
341341
},
342-
"revision": "20211206",
342+
"revision": "20220107",
343343
"rootUrl": "https://ondemandscanning.googleapis.com/",
344344
"schemas": {
345345
"AliasContext": {
@@ -947,6 +947,12 @@
947947
"$ref": "Status",
948948
"description": "When an error is encountered this will contain a LocalizedMessage under details to show to the user. The LocalizedMessage is output only and populated by the API."
949949
},
950+
"archiveTime": {
951+
"description": "Output only. The time occurrences related to this discovery occurrence were archived.",
952+
"format": "google-datetime",
953+
"readOnly": true,
954+
"type": "string"
955+
},
950956
"continuousAnalysis": {
951957
"description": "Whether the resource is continuously analyzed.",
952958
"enum": [
@@ -1174,11 +1180,11 @@
11741180
"id": "InTotoStatement",
11751181
"properties": {
11761182
"_type": {
1177-
"description": "Always \"https://in-toto.io/Statement/v0.1\".",
1183+
"description": "Always `https://in-toto.io/Statement/v0.1`.",
11781184
"type": "string"
11791185
},
11801186
"predicateType": {
1181-
"description": "\"https://slsa.dev/provenance/v0.1\" for SlsaProvenance.",
1187+
"description": "`https://slsa.dev/provenance/v0.1` for SlsaProvenance.",
11821188
"type": "string"
11831189
},
11841190
"provenance": {
@@ -1321,15 +1327,15 @@
13211327
"type": "object"
13221328
},
13231329
"NonCompliantFile": {
1324-
"description": "Details about files that caused a compliance check to fail.",
1330+
"description": "Details about files that caused a compliance check to fail. display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'.",
13251331
"id": "NonCompliantFile",
13261332
"properties": {
13271333
"displayCommand": {
13281334
"description": "Command to display the non-compliant files.",
13291335
"type": "string"
13301336
},
13311337
"path": {
1332-
"description": "display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'. Empty if `display_command` is set.",
1338+
"description": "Empty if `display_command` is set.",
13331339
"type": "string"
13341340
},
13351341
"reason": {
@@ -1915,7 +1921,7 @@
19151921
"additionalProperties": {
19161922
"type": "string"
19171923
},
1918-
"description": "\"\": \"\" Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet",
1924+
"description": "`\"\": \"\"` Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet",
19191925
"type": "object"
19201926
},
19211927
"name": {

0 commit comments

Comments
 (0)