blob: b12997b277c080345b0c960bb30bc968fbb257c9 [file] [log] [blame]
<html><body>
<style>
body, h1, h2, h3, div, span, p, pre, a {
margin: 0;
padding: 0;
border: 0;
font-weight: inherit;
font-style: inherit;
font-size: 100%;
font-family: inherit;
vertical-align: baseline;
}
body {
font-size: 13px;
padding: 1em;
}
h1 {
font-size: 26px;
margin-bottom: 1em;
}
h2 {
font-size: 24px;
margin-bottom: 1em;
}
h3 {
font-size: 20px;
margin-bottom: 1em;
margin-top: 1em;
}
pre, code {
line-height: 1.5;
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}
pre {
margin-top: 0.5em;
}
h1, h2, h3, p {
font-family: Arial, sans serif;
}
h1, h2, h3 {
border-bottom: solid #CCC 1px;
}
.toc_element {
margin-top: 0.5em;
}
.firstline {
margin-left: 2 em;
}
.method {
margin-top: 1em;
border: solid 1px #CCC;
padding: 1em;
background: #EEE;
}
.details {
font-weight: bold;
font-size: 14px;
}
</style>
<h1><a href="ondemandscanning_v1beta1.html">On-Demand Scanning API</a> . <a href="ondemandscanning_v1beta1.projects.html">projects</a> . <a href="ondemandscanning_v1beta1.projects.locations.html">locations</a> . <a href="ondemandscanning_v1beta1.projects.locations.scans.html">scans</a> . <a href="ondemandscanning_v1beta1.projects.locations.scans.vulnerabilities.html">vulnerabilities</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
<code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<p class="toc_element">
<code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
<p class="firstline">Lists vulnerabilities resulting from a successfully completed scan.</p>
<p class="toc_element">
<code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
<p class="firstline">Retrieves the next page of results.</p>
<h3>Method Details</h3>
<div class="method">
<code class="details" id="close">close()</code>
<pre>Close httplib2 connections.</pre>
</div>
<div class="method">
<code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
<pre>Lists vulnerabilities resulting from a successfully completed scan.
Args:
parent: string, Required. The parent of the collection of Vulnerabilities being requested. Format: projects/[project_name]/locations/[location]/scans/[scan_id] (required)
pageSize: integer, The number of vulnerabilities to retrieve.
pageToken: string, The page token, resulting from a previous call to ListVulnerabilities.
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
2 - v2 error format
Returns:
An object of the form:
{ # ListVulnerabilitiesResponse contains a single page of vulnerabilities resulting from a scan.
&quot;nextPageToken&quot;: &quot;A String&quot;, # A page token that can be used in a subsequent call to ListVulnerabilities to continue retrieving results.
&quot;occurrences&quot;: [ # The list of Vulnerability Occurrences resulting from a scan.
{ # An instance of an analysis type that has been found on a resource.
&quot;attestation&quot;: { # Occurrence that represents a single &quot;attestation&quot;. The authenticity of an attestation can be verified using the attached signature. If the verifier trusts the public key of the signer, then verifying the signature is sufficient to establish trust. In this circumstance, the authority to which this attestation is attached is primarily useful for lookup (how to find this attestation if you already know the authority and artifact to be verified) and intent (for which authority this attestation was intended to sign. # Describes an attestation of an artifact.
&quot;jwts&quot;: [ # One or more JWTs encoding a self-contained attestation. Each JWT encodes the payload that it verifies within the JWT itself. Verifier implementation SHOULD ignore the `serialized_payload` field when verifying these JWTs. If only JWTs are present on this AttestationOccurrence, then the `serialized_payload` SHOULD be left empty. Each JWT SHOULD encode a claim specific to the `resource_uri` of this Occurrence, but this is not validated by Grafeas metadata API implementations. The JWT itself is opaque to Grafeas.
{
&quot;compactJwt&quot;: &quot;A String&quot;, # The compact encoding of a JWS, which is always three base64 encoded strings joined by periods. For details, see: https://tools.ietf.org/html/rfc7515.html#section-3.1
},
],
&quot;serializedPayload&quot;: &quot;A String&quot;, # Required. The serialized payload that is verified by one or more `signatures`.
&quot;signatures&quot;: [ # One or more signatures over `serialized_payload`. Verifier implementations should consider this attestation message verified if at least one `signature` verifies `serialized_payload`. See `Signature` in common.proto for more details on signature structure and verification.
{ # Verifiers (e.g. Kritis implementations) MUST verify signatures with respect to the trust anchors defined in policy (e.g. a Kritis policy). Typically this means that the verifier has been configured with a map from `public_key_id` to public key material (and any required parameters, e.g. signing algorithm). In particular, verification implementations MUST NOT treat the signature `public_key_id` as anything more than a key lookup hint. The `public_key_id` DOES NOT validate or authenticate a public key; it only provides a mechanism for quickly selecting a public key ALREADY CONFIGURED on the verifier through a trusted channel. Verification implementations MUST reject signatures in any of the following circumstances: * The `public_key_id` is not recognized by the verifier. * The public key that `public_key_id` refers to does not verify the signature with respect to the payload. The `signature` contents SHOULD NOT be &quot;attached&quot; (where the payload is included with the serialized `signature` bytes). Verifiers MUST ignore any &quot;attached&quot; payload and only verify signatures with respect to explicitly provided payload (e.g. a `payload` field on the proto message that holds this Signature, or the canonical serialization of the proto message that holds this signature).
&quot;publicKeyId&quot;: &quot;A String&quot;, # The identifier for the public key that verifies this signature. * The `public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986 conformant URI. * When possible, the `public_key_id` SHOULD be an immutable reference, such as a cryptographic digest. Examples of valid `public_key_id`s: OpenPGP V4 public key fingerprint: * &quot;openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA&quot; See https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more details on this scheme. RFC6920 digest-named SubjectPublicKeyInfo (digest of the DER serialization): * &quot;ni:///sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU&quot; * &quot;nih:///sha-256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5&quot;
&quot;signature&quot;: &quot;A String&quot;, # The content of the signature, an opaque bytestring. The payload that this signature verifies MUST be unambiguously provided with the Signature during verification. A wrapper message might provide the payload explicitly. Alternatively, a message might have a canonical serialization that can always be unambiguously computed to derive the payload.
},
],
},
&quot;build&quot;: { # Details of a build occurrence. # Describes a verifiable build.
&quot;intotoProvenance&quot;: { # Deprecated. See InTotoStatement for the replacement. In-toto Provenance representation as defined in spec.
&quot;builderConfig&quot;: { # required
&quot;id&quot;: &quot;A String&quot;,
},
&quot;materials&quot;: [ # The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
&quot;A String&quot;,
],
&quot;metadata&quot;: { # Other properties of the build.
&quot;buildFinishedOn&quot;: &quot;A String&quot;, # The timestamp of when the build completed.
&quot;buildInvocationId&quot;: &quot;A String&quot;, # Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
&quot;buildStartedOn&quot;: &quot;A String&quot;, # The timestamp of when the build started.
&quot;completeness&quot;: { # Indicates that the builder claims certain fields in this message to be complete. # Indicates that the builder claims certain fields in this message to be complete.
&quot;arguments&quot;: True or False, # If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
&quot;environment&quot;: True or False, # If true, the builder claims that recipe.environment is claimed to be complete.
&quot;materials&quot;: True or False, # If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called &quot;hermetic&quot;.
},
&quot;reproducible&quot;: True or False, # If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
},
&quot;recipe&quot;: { # Steps taken to build the artifact. For a TaskRun, typically each container corresponds to one step in the recipe. # Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
&quot;arguments&quot;: [ # Collection of all external inputs that influenced the build on top of recipe.definedInMaterial and recipe.entryPoint. For example, if the recipe type were &quot;make&quot;, then this might be the flags passed to make aside from the target, which is captured in recipe.entryPoint. Since the arguments field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;definedInMaterial&quot;: &quot;A String&quot;, # Index in materials containing the recipe steps that are not implied by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would point to the source containing the Makefile, not the make program itself. Set to -1 if the recipe doesn&#x27;t come from a material, as zero is default unset value for int64.
&quot;entryPoint&quot;: &quot;A String&quot;, # String identifying the entry point into the build. This is often a path to a configuration file and/or a target label within that file. The syntax and meaning are defined by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would reference the directory in which to run make as well as which target to use.
&quot;environment&quot;: [ # Any other builder-controlled inputs necessary for correctly evaluating the recipe. Usually only needed for reproducing the build but not evaluated as part of policy. Since the environment field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;type&quot;: &quot;A String&quot;, # URI indicating what type of recipe was performed. It determines the meaning of recipe.entryPoint, recipe.arguments, recipe.environment, and materials.
},
},
&quot;intotoStatement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;. # In-toto Statement representation as defined in spec. The intoto_statement can contain any type of provenance. The serialized payload of the statement can be stored and signed in the Occurrence&#x27;s envelope.
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
&quot;provenance&quot;: {
&quot;builderConfig&quot;: { # required
&quot;id&quot;: &quot;A String&quot;,
},
&quot;materials&quot;: [ # The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
&quot;A String&quot;,
],
&quot;metadata&quot;: { # Other properties of the build.
&quot;buildFinishedOn&quot;: &quot;A String&quot;, # The timestamp of when the build completed.
&quot;buildInvocationId&quot;: &quot;A String&quot;, # Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
&quot;buildStartedOn&quot;: &quot;A String&quot;, # The timestamp of when the build started.
&quot;completeness&quot;: { # Indicates that the builder claims certain fields in this message to be complete. # Indicates that the builder claims certain fields in this message to be complete.
&quot;arguments&quot;: True or False, # If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
&quot;environment&quot;: True or False, # If true, the builder claims that recipe.environment is claimed to be complete.
&quot;materials&quot;: True or False, # If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called &quot;hermetic&quot;.
},
&quot;reproducible&quot;: True or False, # If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
},
&quot;recipe&quot;: { # Steps taken to build the artifact. For a TaskRun, typically each container corresponds to one step in the recipe. # Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
&quot;arguments&quot;: [ # Collection of all external inputs that influenced the build on top of recipe.definedInMaterial and recipe.entryPoint. For example, if the recipe type were &quot;make&quot;, then this might be the flags passed to make aside from the target, which is captured in recipe.entryPoint. Since the arguments field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;definedInMaterial&quot;: &quot;A String&quot;, # Index in materials containing the recipe steps that are not implied by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would point to the source containing the Makefile, not the make program itself. Set to -1 if the recipe doesn&#x27;t come from a material, as zero is default unset value for int64.
&quot;entryPoint&quot;: &quot;A String&quot;, # String identifying the entry point into the build. This is often a path to a configuration file and/or a target label within that file. The syntax and meaning are defined by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would reference the directory in which to run make as well as which target to use.
&quot;environment&quot;: [ # Any other builder-controlled inputs necessary for correctly evaluating the recipe. Usually only needed for reproducing the build but not evaluated as part of policy. Since the environment field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;type&quot;: &quot;A String&quot;, # URI indicating what type of recipe was performed. It determines the meaning of recipe.entryPoint, recipe.arguments, recipe.environment, and materials.
},
},
&quot;slsaProvenance&quot;: {
&quot;builder&quot;: { # required
&quot;id&quot;: &quot;A String&quot;,
},
&quot;materials&quot;: [ # The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
{
&quot;digest&quot;: {
&quot;a_key&quot;: &quot;A String&quot;,
},
&quot;uri&quot;: &quot;A String&quot;,
},
],
&quot;metadata&quot;: { # Other properties of the build.
&quot;buildFinishedOn&quot;: &quot;A String&quot;, # The timestamp of when the build completed.
&quot;buildInvocationId&quot;: &quot;A String&quot;, # Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
&quot;buildStartedOn&quot;: &quot;A String&quot;, # The timestamp of when the build started.
&quot;completeness&quot;: { # Indicates that the builder claims certain fields in this message to be complete. # Indicates that the builder claims certain fields in this message to be complete.
&quot;arguments&quot;: True or False, # If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
&quot;environment&quot;: True or False, # If true, the builder claims that recipe.environment is claimed to be complete.
&quot;materials&quot;: True or False, # If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called &quot;hermetic&quot;.
},
&quot;reproducible&quot;: True or False, # If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
},
&quot;recipe&quot;: { # Steps taken to build the artifact. For a TaskRun, typically each container corresponds to one step in the recipe. # Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
&quot;arguments&quot;: { # Collection of all external inputs that influenced the build on top of recipe.definedInMaterial and recipe.entryPoint. For example, if the recipe type were &quot;make&quot;, then this might be the flags passed to make aside from the target, which is captured in recipe.entryPoint. Depending on the recipe Type, the structure may be different.
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
&quot;definedInMaterial&quot;: &quot;A String&quot;, # Index in materials containing the recipe steps that are not implied by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would point to the source containing the Makefile, not the make program itself. Set to -1 if the recipe doesn&#x27;t come from a material, as zero is default unset value for int64.
&quot;entryPoint&quot;: &quot;A String&quot;, # String identifying the entry point into the build. This is often a path to a configuration file and/or a target label within that file. The syntax and meaning are defined by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would reference the directory in which to run make as well as which target to use.
&quot;environment&quot;: { # Any other builder-controlled inputs necessary for correctly evaluating the recipe. Usually only needed for reproducing the build but not evaluated as part of policy. Depending on the recipe Type, the structure may be different.
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
&quot;type&quot;: &quot;A String&quot;, # URI indicating what type of recipe was performed. It determines the meaning of recipe.entryPoint, recipe.arguments, recipe.environment, and materials.
},
},
&quot;subject&quot;: [
{
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
&quot;a_key&quot;: &quot;A String&quot;,
},
&quot;name&quot;: &quot;A String&quot;,
},
],
},
&quot;provenance&quot;: { # Provenance of a build. Contains all information needed to verify the full details about the build from source to completion. # The actual provenance for the build.
&quot;buildOptions&quot;: { # Special options applied to this build. This is a catch-all field where build providers can enter any desired additional details.
&quot;a_key&quot;: &quot;A String&quot;,
},
&quot;builderVersion&quot;: &quot;A String&quot;, # Version string of the builder at the time this build was executed.
&quot;builtArtifacts&quot;: [ # Output of the build.
{ # Artifact describes a build product.
&quot;checksum&quot;: &quot;A String&quot;, # Hash or checksum value of a binary, or Docker Registry 2.0 digest of a container.
&quot;id&quot;: &quot;A String&quot;, # Artifact ID, if any; for container images, this will be a URL by digest like `gcr.io/projectID/imagename@sha256:123456`.
&quot;names&quot;: [ # Related artifact names. This may be the path to a binary or jar file, or in the case of a container build, the name used to push the container image to Google Container Registry, as presented to `docker push`. Note that a single Artifact ID can have multiple names, for example if two tags are applied to one image.
&quot;A String&quot;,
],
},
],
&quot;commands&quot;: [ # Commands requested by the build.
{ # Command describes a step performed as part of the build pipeline.
&quot;args&quot;: [ # Command-line arguments used when executing this command.
&quot;A String&quot;,
],
&quot;dir&quot;: &quot;A String&quot;, # Working directory (relative to project source root) used when running this command.
&quot;env&quot;: [ # Environment variables set before running this command.
&quot;A String&quot;,
],
&quot;id&quot;: &quot;A String&quot;, # Optional unique identifier for this command, used in wait_for to reference this command as a dependency.
&quot;name&quot;: &quot;A String&quot;, # Required. Name of the command, as presented on the command line, or if the command is packaged as a Docker container, as presented to `docker pull`.
&quot;waitFor&quot;: [ # The ID(s) of the command(s) that this command depends on.
&quot;A String&quot;,
],
},
],
&quot;createTime&quot;: &quot;A String&quot;, # Time at which the build was created.
&quot;creator&quot;: &quot;A String&quot;, # E-mail address of the user who initiated this build. Note that this was the user&#x27;s e-mail address at the time the build was initiated; this address may not represent the same end-user for all time.
&quot;endTime&quot;: &quot;A String&quot;, # Time at which execution of the build was finished.
&quot;id&quot;: &quot;A String&quot;, # Required. Unique identifier of the build.
&quot;logsUri&quot;: &quot;A String&quot;, # URI where any logs for this provenance were written.
&quot;projectId&quot;: &quot;A String&quot;, # ID of the project.
&quot;sourceProvenance&quot;: { # Source describes the location of the source used for the build. # Details of the Source input to the build.
&quot;additionalContexts&quot;: [ # If provided, some of the source code used for the build may be found in these locations, in the case where the source repository had multiple remotes or submodules. This list will not include the context specified in the context field.
{ # A SourceContext is a reference to a tree of files. A SourceContext together with a path point to a unique revision of a single file or directory.
&quot;cloudRepo&quot;: { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud Source Repo. # A SourceContext referring to a revision in a Google Cloud Source Repo.
&quot;aliasContext&quot;: { # An alias to a repo revision. # An alias, which may be a branch or tag.
&quot;kind&quot;: &quot;A String&quot;, # The alias kind.
&quot;name&quot;: &quot;A String&quot;, # The alias name.
},
&quot;repoId&quot;: { # A unique identifier for a Cloud Repo. # The ID of the repo.
&quot;projectRepoId&quot;: { # Selects a repo using a Google Cloud Platform project ID (e.g., winged-cargo-31) and a repo name within that project. # A combination of a project ID and a repo name.
&quot;projectId&quot;: &quot;A String&quot;, # The ID of the project.
&quot;repoName&quot;: &quot;A String&quot;, # The name of the repo. Leave empty for the default repo.
},
&quot;uid&quot;: &quot;A String&quot;, # A server-assigned, globally unique identifier.
},
&quot;revisionId&quot;: &quot;A String&quot;, # A revision ID.
},
&quot;gerrit&quot;: { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
&quot;aliasContext&quot;: { # An alias to a repo revision. # An alias, which may be a branch or tag.
&quot;kind&quot;: &quot;A String&quot;, # The alias kind.
&quot;name&quot;: &quot;A String&quot;, # The alias name.
},
&quot;gerritProject&quot;: &quot;A String&quot;, # The full project name within the host. Projects may be nested, so &quot;project/subproject&quot; is a valid project name. The &quot;repo name&quot; is the hostURI/project.
&quot;hostUri&quot;: &quot;A String&quot;, # The URI of a running Gerrit instance.
&quot;revisionId&quot;: &quot;A String&quot;, # A revision (commit) ID.
},
&quot;git&quot;: { # A GitSourceContext denotes a particular revision in a third party Git repository (e.g., GitHub). # A SourceContext referring to any third party Git repo (e.g., GitHub).
&quot;revisionId&quot;: &quot;A String&quot;, # Git commit hash.
&quot;url&quot;: &quot;A String&quot;, # Git repository URL.
},
&quot;labels&quot;: { # Labels with user defined metadata.
&quot;a_key&quot;: &quot;A String&quot;,
},
},
],
&quot;artifactStorageSourceUri&quot;: &quot;A String&quot;, # If provided, the input binary artifacts for the build came from this location.
&quot;context&quot;: { # A SourceContext is a reference to a tree of files. A SourceContext together with a path point to a unique revision of a single file or directory. # If provided, the source code used for the build came from this location.
&quot;cloudRepo&quot;: { # A CloudRepoSourceContext denotes a particular revision in a Google Cloud Source Repo. # A SourceContext referring to a revision in a Google Cloud Source Repo.
&quot;aliasContext&quot;: { # An alias to a repo revision. # An alias, which may be a branch or tag.
&quot;kind&quot;: &quot;A String&quot;, # The alias kind.
&quot;name&quot;: &quot;A String&quot;, # The alias name.
},
&quot;repoId&quot;: { # A unique identifier for a Cloud Repo. # The ID of the repo.
&quot;projectRepoId&quot;: { # Selects a repo using a Google Cloud Platform project ID (e.g., winged-cargo-31) and a repo name within that project. # A combination of a project ID and a repo name.
&quot;projectId&quot;: &quot;A String&quot;, # The ID of the project.
&quot;repoName&quot;: &quot;A String&quot;, # The name of the repo. Leave empty for the default repo.
},
&quot;uid&quot;: &quot;A String&quot;, # A server-assigned, globally unique identifier.
},
&quot;revisionId&quot;: &quot;A String&quot;, # A revision ID.
},
&quot;gerrit&quot;: { # A SourceContext referring to a Gerrit project. # A SourceContext referring to a Gerrit project.
&quot;aliasContext&quot;: { # An alias to a repo revision. # An alias, which may be a branch or tag.
&quot;kind&quot;: &quot;A String&quot;, # The alias kind.
&quot;name&quot;: &quot;A String&quot;, # The alias name.
},
&quot;gerritProject&quot;: &quot;A String&quot;, # The full project name within the host. Projects may be nested, so &quot;project/subproject&quot; is a valid project name. The &quot;repo name&quot; is the hostURI/project.
&quot;hostUri&quot;: &quot;A String&quot;, # The URI of a running Gerrit instance.
&quot;revisionId&quot;: &quot;A String&quot;, # A revision (commit) ID.
},
&quot;git&quot;: { # A GitSourceContext denotes a particular revision in a third party Git repository (e.g., GitHub). # A SourceContext referring to any third party Git repo (e.g., GitHub).
&quot;revisionId&quot;: &quot;A String&quot;, # Git commit hash.
&quot;url&quot;: &quot;A String&quot;, # Git repository URL.
},
&quot;labels&quot;: { # Labels with user defined metadata.
&quot;a_key&quot;: &quot;A String&quot;,
},
},
&quot;fileHashes&quot;: { # Hash(es) of the build source, which can be used to verify that the original source integrity was maintained in the build. The keys to this map are file paths used as build source and the values contain the hash values for those files. If the build source came in a single package such as a gzipped tarfile (.tar.gz), the FileHash will be for the single path to that file.
&quot;a_key&quot;: { # Container message for hashes of byte content of files, used in source messages to verify integrity of source input to the build.
&quot;fileHash&quot;: [ # Required. Collection of file hashes.
{ # Container message for hash values.
&quot;type&quot;: &quot;A String&quot;, # Required. The type of hash that was performed, e.g. &quot;SHA-256&quot;.
&quot;value&quot;: &quot;A String&quot;, # Required. The hash value.
},
],
},
},
},
&quot;startTime&quot;: &quot;A String&quot;, # Time at which execution of the build was started.
&quot;triggerId&quot;: &quot;A String&quot;, # Trigger identifier if the build was triggered automatically; empty if not.
},
&quot;provenanceBytes&quot;: &quot;A String&quot;, # Serialized JSON representation of the provenance, used in generating the build signature in the corresponding build note. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
},
&quot;compliance&quot;: { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes a compliance violation on a linked resource.
&quot;nonComplianceReason&quot;: &quot;A String&quot;,
&quot;nonCompliantFiles&quot;: [
{ # Details about files that caused a compliance check to fail.
&quot;displayCommand&quot;: &quot;A String&quot;, # Command to display the non-compliant files.
&quot;path&quot;: &quot;A String&quot;, # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;. Empty if `display_command` is set.
&quot;reason&quot;: &quot;A String&quot;, # Explains why a file is non compliant for a CIS check.
},
],
},
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this occurrence was created.
&quot;deployment&quot;: { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
&quot;address&quot;: &quot;A String&quot;, # Address of the runtime element hosting this deployment.
&quot;config&quot;: &quot;A String&quot;, # Configuration used to create this deployment.
&quot;deployTime&quot;: &quot;A String&quot;, # Required. Beginning of the lifetime of this deployment.
&quot;platform&quot;: &quot;A String&quot;, # Platform hosting this deployment.
&quot;resourceUri&quot;: [ # Output only. Resource URI for the artifact being deployed taken from the deployable field with the same name.
&quot;A String&quot;,
],
&quot;undeployTime&quot;: &quot;A String&quot;, # End of the lifetime of this deployment.
&quot;userEmail&quot;: &quot;A String&quot;, # Identity of the user that triggered this deployment.
},
&quot;discovery&quot;: { # Provides information about the analysis status of a discovered resource. # Describes when a resource was discovered.
&quot;analysisStatus&quot;: &quot;A String&quot;, # The status of discovery for the resource.
&quot;analysisStatusError&quot;: { # The `Status` type defines a logical error model that is suitable for different programming environments, including REST APIs and RPC APIs. It is used by [gRPC](https://github.com/grpc). Each `Status` message contains three pieces of data: error code, error message, and error details. You can find out more about this error model and how to work with it in the [API Design Guide](https://cloud.google.com/apis/design/errors). # When an error is encountered this will contain a LocalizedMessage under details to show to the user. The LocalizedMessage is output only and populated by the API.
&quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
&quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of message types for APIs to use.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any user-facing error message should be localized and sent in the google.rpc.Status.details field, or localized by the client.
},
&quot;continuousAnalysis&quot;: &quot;A String&quot;, # Whether the resource is continuously analyzed.
&quot;cpe&quot;: &quot;A String&quot;, # The CPE of the resource being scanned.
&quot;lastScanTime&quot;: &quot;A String&quot;, # The last time this resource was scanned.
},
&quot;dsseAttestation&quot;: { # Deprecated. Prefer to use a regular Occurrence, and populate the Envelope at the top level of the Occurrence. # Describes an attestation of an artifact using dsse.
&quot;envelope&quot;: { # MUST match https://github.com/secure-systems-lab/dsse/blob/master/envelope.proto. An authenticated message of arbitrary type. # If doing something security critical, make sure to verify the signatures in this metadata.
&quot;payload&quot;: &quot;A String&quot;,
&quot;payloadType&quot;: &quot;A String&quot;,
&quot;signatures&quot;: [
{
&quot;keyid&quot;: &quot;A String&quot;,
&quot;sig&quot;: &quot;A String&quot;,
},
],
},
&quot;statement&quot;: { # Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always &quot;application/vnd.in-toto+json&quot;.
&quot;_type&quot;: &quot;A String&quot;, # Always &quot;https://in-toto.io/Statement/v0.1&quot;.
&quot;predicateType&quot;: &quot;A String&quot;, # &quot;https://slsa.dev/provenance/v0.1&quot; for SlsaProvenance.
&quot;provenance&quot;: {
&quot;builderConfig&quot;: { # required
&quot;id&quot;: &quot;A String&quot;,
},
&quot;materials&quot;: [ # The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
&quot;A String&quot;,
],
&quot;metadata&quot;: { # Other properties of the build.
&quot;buildFinishedOn&quot;: &quot;A String&quot;, # The timestamp of when the build completed.
&quot;buildInvocationId&quot;: &quot;A String&quot;, # Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
&quot;buildStartedOn&quot;: &quot;A String&quot;, # The timestamp of when the build started.
&quot;completeness&quot;: { # Indicates that the builder claims certain fields in this message to be complete. # Indicates that the builder claims certain fields in this message to be complete.
&quot;arguments&quot;: True or False, # If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
&quot;environment&quot;: True or False, # If true, the builder claims that recipe.environment is claimed to be complete.
&quot;materials&quot;: True or False, # If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called &quot;hermetic&quot;.
},
&quot;reproducible&quot;: True or False, # If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
},
&quot;recipe&quot;: { # Steps taken to build the artifact. For a TaskRun, typically each container corresponds to one step in the recipe. # Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
&quot;arguments&quot;: [ # Collection of all external inputs that influenced the build on top of recipe.definedInMaterial and recipe.entryPoint. For example, if the recipe type were &quot;make&quot;, then this might be the flags passed to make aside from the target, which is captured in recipe.entryPoint. Since the arguments field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;definedInMaterial&quot;: &quot;A String&quot;, # Index in materials containing the recipe steps that are not implied by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would point to the source containing the Makefile, not the make program itself. Set to -1 if the recipe doesn&#x27;t come from a material, as zero is default unset value for int64.
&quot;entryPoint&quot;: &quot;A String&quot;, # String identifying the entry point into the build. This is often a path to a configuration file and/or a target label within that file. The syntax and meaning are defined by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would reference the directory in which to run make as well as which target to use.
&quot;environment&quot;: [ # Any other builder-controlled inputs necessary for correctly evaluating the recipe. Usually only needed for reproducing the build but not evaluated as part of policy. Since the environment field can greatly vary in structure, depending on the builder and recipe type, this is of form &quot;Any&quot;.
{
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
],
&quot;type&quot;: &quot;A String&quot;, # URI indicating what type of recipe was performed. It determines the meaning of recipe.entryPoint, recipe.arguments, recipe.environment, and materials.
},
},
&quot;slsaProvenance&quot;: {
&quot;builder&quot;: { # required
&quot;id&quot;: &quot;A String&quot;,
},
&quot;materials&quot;: [ # The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
{
&quot;digest&quot;: {
&quot;a_key&quot;: &quot;A String&quot;,
},
&quot;uri&quot;: &quot;A String&quot;,
},
],
&quot;metadata&quot;: { # Other properties of the build.
&quot;buildFinishedOn&quot;: &quot;A String&quot;, # The timestamp of when the build completed.
&quot;buildInvocationId&quot;: &quot;A String&quot;, # Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
&quot;buildStartedOn&quot;: &quot;A String&quot;, # The timestamp of when the build started.
&quot;completeness&quot;: { # Indicates that the builder claims certain fields in this message to be complete. # Indicates that the builder claims certain fields in this message to be complete.
&quot;arguments&quot;: True or False, # If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
&quot;environment&quot;: True or False, # If true, the builder claims that recipe.environment is claimed to be complete.
&quot;materials&quot;: True or False, # If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called &quot;hermetic&quot;.
},
&quot;reproducible&quot;: True or False, # If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
},
&quot;recipe&quot;: { # Steps taken to build the artifact. For a TaskRun, typically each container corresponds to one step in the recipe. # Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
&quot;arguments&quot;: { # Collection of all external inputs that influenced the build on top of recipe.definedInMaterial and recipe.entryPoint. For example, if the recipe type were &quot;make&quot;, then this might be the flags passed to make aside from the target, which is captured in recipe.entryPoint. Depending on the recipe Type, the structure may be different.
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
&quot;definedInMaterial&quot;: &quot;A String&quot;, # Index in materials containing the recipe steps that are not implied by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would point to the source containing the Makefile, not the make program itself. Set to -1 if the recipe doesn&#x27;t come from a material, as zero is default unset value for int64.
&quot;entryPoint&quot;: &quot;A String&quot;, # String identifying the entry point into the build. This is often a path to a configuration file and/or a target label within that file. The syntax and meaning are defined by recipe.type. For example, if the recipe type were &quot;make&quot;, then this would reference the directory in which to run make as well as which target to use.
&quot;environment&quot;: { # Any other builder-controlled inputs necessary for correctly evaluating the recipe. Usually only needed for reproducing the build but not evaluated as part of policy. Depending on the recipe Type, the structure may be different.
&quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
},
&quot;type&quot;: &quot;A String&quot;, # URI indicating what type of recipe was performed. It determines the meaning of recipe.entryPoint, recipe.arguments, recipe.environment, and materials.
},
},
&quot;subject&quot;: [
{
&quot;digest&quot;: { # &quot;&quot;: &quot;&quot; Algorithms can be e.g. sha256, sha512 See https://github.com/in-toto/attestation/blob/main/spec/field_types.md#DigestSet
&quot;a_key&quot;: &quot;A String&quot;,
},
&quot;name&quot;: &quot;A String&quot;,
},
],
},
},
&quot;envelope&quot;: { # MUST match https://github.com/secure-systems-lab/dsse/blob/master/envelope.proto. An authenticated message of arbitrary type. # https://github.com/secure-systems-lab/dsse
&quot;payload&quot;: &quot;A String&quot;,
&quot;payloadType&quot;: &quot;A String&quot;,
&quot;signatures&quot;: [
{
&quot;keyid&quot;: &quot;A String&quot;,
&quot;sig&quot;: &quot;A String&quot;,
},
],
},
&quot;image&quot;: { # Details of the derived image portion of the DockerImage relationship. This image would be produced from a Dockerfile with FROM . # Describes how this resource derives from the basis in the associated note.
&quot;baseResourceUrl&quot;: &quot;A String&quot;, # Output only. This contains the base image URL for the derived image occurrence.
&quot;distance&quot;: 42, # Output only. The number of layers by which this image differs from the associated image basis.
&quot;fingerprint&quot;: { # A set of properties that uniquely identify a given Docker image. # Required. The fingerprint of the derived image.
&quot;v1Name&quot;: &quot;A String&quot;, # Required. The layer ID of the final layer in the Docker image&#x27;s v1 representation.
&quot;v2Blob&quot;: [ # Required. The ordered list of v2 blobs that represent a given image.
&quot;A String&quot;,
],
&quot;v2Name&quot;: &quot;A String&quot;, # Output only. The name of the image&#x27;s v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + &quot; &quot; + v2_name[N+1]) Only the name of the final blob is kept.
},
&quot;layerInfo&quot;: [ # This contains layer-specific metadata, if populated it has length &quot;distance&quot; and is ordered with [distance] being the layer immediately following the base image and [1] being the final layer.
{ # Layer holds metadata specific to a layer of a Docker image.
&quot;arguments&quot;: &quot;A String&quot;, # The recovered arguments to the Dockerfile directive.
&quot;directive&quot;: &quot;A String&quot;, # Required. The recovered Dockerfile directive used to construct this layer. See https://docs.docker.com/engine/reference/builder/ for more information.
},
],
},
&quot;kind&quot;: &quot;A String&quot;, # Output only. This explicitly denotes which of the occurrence details are specified. This field can be used as a filter in list requests.
&quot;name&quot;: &quot;A String&quot;, # Output only. The name of the occurrence in the form of `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
&quot;noteName&quot;: &quot;A String&quot;, # Required. Immutable. The analysis note associated with this occurrence, in the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be used as a filter in list requests.
&quot;package&quot;: { # Details on how a particular software package was installed on a system. # Describes the installation of a package on the linked resource.
&quot;location&quot;: [ # Required. All of the places within the filesystem versions of this package have been found.
{ # An occurrence of a particular package installation found within a system&#x27;s filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
&quot;cpeUri&quot;: &quot;A String&quot;, # Required. The CPE URI in [CPE format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package.
&quot;path&quot;: &quot;A String&quot;, # The path from which we gathered that this package/version is installed.
&quot;version&quot;: { # Version contains structured information about the version of a package. # The version installed at this location.
&quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
&quot;fullName&quot;: &quot;A String&quot;, # Human readable version string. This string is of the form :- and is only set when kind is NORMAL.
&quot;inclusive&quot;: True or False, # Whether this version is specifying part of an inclusive range. Grafeas does not have the capability to specify version ranges; instead we have fields that specify start version and end versions. At times this is insufficient - we also need to specify whether the version is included in the range or is excluded from the range. This boolean is expected to be set to true when the version is included in a range.
&quot;kind&quot;: &quot;A String&quot;, # Required. Distinguishes between sentinel MIN/MAX versions and normal versions.
&quot;name&quot;: &quot;A String&quot;, # Required only when version kind is NORMAL. The main part of the version name.
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
},
},
],
&quot;name&quot;: &quot;A String&quot;, # Output only. The name of the installed package.
},
&quot;remediation&quot;: &quot;A String&quot;, # A description of actions that can be taken to remedy the note.
&quot;resourceUri&quot;: &quot;A String&quot;, # Required. Immutable. A URI that represents the resource for which the occurrence applies. For example, `https://gcr.io/project/image@sha256:123abc` for a Docker image.
&quot;updateTime&quot;: &quot;A String&quot;, # Output only. The time this occurrence was last updated.
&quot;upgrade&quot;: { # An Upgrade Occurrence represents that a specific resource_url could install a specific upgrade. This presence is supplied via local sources (i.e. it is present in the mirror and the running system has noticed its availability). For Windows, both distribution and windows_update contain information for the Windows update. # Describes an available package upgrade on the linked resource.
&quot;distribution&quot;: { # The Upgrade Distribution represents metadata about the Upgrade for each operating system (CPE). Some distributions have additional metadata around updates, classifying them into various categories and severities. # Metadata about the upgrade for available for the specific operating system for the resource_url. This allows efficient filtering, as well as making it easier to use the occurrence.
&quot;classification&quot;: &quot;A String&quot;, # The operating system classification of this Upgrade, as specified by the upstream operating system upgrade feed. For Windows the classification is one of the category_ids listed at https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ff357803(v=vs.85)
&quot;cpeUri&quot;: &quot;A String&quot;, # Required - The specific operating system this metadata applies to. See https://cpe.mitre.org/specification/.
&quot;cve&quot;: [ # The cve tied to this Upgrade.
&quot;A String&quot;,
],
&quot;severity&quot;: &quot;A String&quot;, # The severity as specified by the upstream operating system.
},
&quot;package&quot;: &quot;A String&quot;, # Required for non-Windows OS. The package this Upgrade is for.
&quot;parsedVersion&quot;: { # Version contains structured information about the version of a package. # Required for non-Windows OS. The version of the package in a machine + human readable form.
&quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
&quot;fullName&quot;: &quot;A String&quot;, # Human readable version string. This string is of the form :- and is only set when kind is NORMAL.
&quot;inclusive&quot;: True or False, # Whether this version is specifying part of an inclusive range. Grafeas does not have the capability to specify version ranges; instead we have fields that specify start version and end versions. At times this is insufficient - we also need to specify whether the version is included in the range or is excluded from the range. This boolean is expected to be set to true when the version is included in a range.
&quot;kind&quot;: &quot;A String&quot;, # Required. Distinguishes between sentinel MIN/MAX versions and normal versions.
&quot;name&quot;: &quot;A String&quot;, # Required only when version kind is NORMAL. The main part of the version name.
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
},
&quot;windowsUpdate&quot;: { # Windows Update represents the metadata about the update for the Windows operating system. The fields in this message come from the Windows Update API documented at https://docs.microsoft.com/en-us/windows/win32/api/wuapi/nn-wuapi-iupdate. # Required for Windows OS. Represents the metadata about the Windows update.
&quot;categories&quot;: [ # The list of categories to which the update belongs.
{ # The category to which the update belongs.
&quot;categoryId&quot;: &quot;A String&quot;, # The identifier of the category.
&quot;name&quot;: &quot;A String&quot;, # The localized name of the category.
},
],
&quot;description&quot;: &quot;A String&quot;, # The localized description of the update.
&quot;identity&quot;: { # The unique identifier of the update. # Required - The unique identifier for the update.
&quot;revision&quot;: 42, # The revision number of the update.
&quot;updateId&quot;: &quot;A String&quot;, # The revision independent identifier of the update.
},
&quot;kbArticleIds&quot;: [ # The Microsoft Knowledge Base article IDs that are associated with the update.
&quot;A String&quot;,
],
&quot;lastPublishedTimestamp&quot;: &quot;A String&quot;, # The last published timestamp of the update.
&quot;supportUrl&quot;: &quot;A String&quot;, # The hyperlink to the support information for the update.
&quot;title&quot;: &quot;A String&quot;, # The localized title of the update.
},
},
&quot;vulnerability&quot;: { # An occurrence of a severity vulnerability on a resource. # Describes a security vulnerability.
&quot;cvssScore&quot;: 3.14, # Output only. The CVSS score of this vulnerability. CVSS score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity.
&quot;cvssv3&quot;: { # Common Vulnerability Scoring System. For details, see https://www.first.org/cvss/specification-document This is a message we will try to use for storing multiple versions of CVSS. The intention is that as new versions of CVSS scores get added, we will be able to modify this message rather than adding new protos for each new version of the score. # The cvss v3 score for the vulnerability.
&quot;attackComplexity&quot;: &quot;A String&quot;,
&quot;attackVector&quot;: &quot;A String&quot;, # Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments.
&quot;authentication&quot;: &quot;A String&quot;,
&quot;availabilityImpact&quot;: &quot;A String&quot;,
&quot;baseScore&quot;: 3.14, # The base score is a function of the base metric scores.
&quot;confidentialityImpact&quot;: &quot;A String&quot;,
&quot;exploitabilityScore&quot;: 3.14,
&quot;impactScore&quot;: 3.14,
&quot;integrityImpact&quot;: &quot;A String&quot;,
&quot;privilegesRequired&quot;: &quot;A String&quot;,
&quot;scope&quot;: &quot;A String&quot;,
&quot;userInteraction&quot;: &quot;A String&quot;,
},
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # The distro assigned severity for this vulnerability when it is available, otherwise this is the note provider assigned severity. When there are multiple PackageIssues for this vulnerability, they can have different effective severities because some might be provided by the distro while others are provided by the language ecosystem for a language pack. For this reason, it is advised to use the effective severity on the PackageIssue level. In the case where multiple PackageIssues have differing effective severities, this field should be the highest severity for any of the PackageIssues.
&quot;fixAvailable&quot;: True or False, # Output only. Whether at least one of the affected packages has a fix available.
&quot;longDescription&quot;: &quot;A String&quot;, # Output only. A detailed description of this vulnerability.
&quot;packageIssue&quot;: [ # Required. The set of affected locations and their fixes (if available) within the associated resource.
{ # A detail for a distro and package this vulnerability occurrence was found in and its associated fix (if one is available).
&quot;affectedCpeUri&quot;: &quot;A String&quot;, # Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was found in.
&quot;affectedPackage&quot;: &quot;A String&quot;, # Required. The package this vulnerability was found in.
&quot;affectedVersion&quot;: { # Version contains structured information about the version of a package. # Required. The version of the package that is installed on the resource affected by this vulnerability.
&quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
&quot;fullName&quot;: &quot;A String&quot;, # Human readable version string. This string is of the form :- and is only set when kind is NORMAL.
&quot;inclusive&quot;: True or False, # Whether this version is specifying part of an inclusive range. Grafeas does not have the capability to specify version ranges; instead we have fields that specify start version and end versions. At times this is insufficient - we also need to specify whether the version is included in the range or is excluded from the range. This boolean is expected to be set to true when the version is included in a range.
&quot;kind&quot;: &quot;A String&quot;, # Required. Distinguishes between sentinel MIN/MAX versions and normal versions.
&quot;name&quot;: &quot;A String&quot;, # Required only when version kind is NORMAL. The main part of the version name.
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
},
&quot;effectiveSeverity&quot;: &quot;A String&quot;, # Output only. The distro or language system assigned severity for this vulnerability when that is available and note provider assigned severity when it is not available.
&quot;fixAvailable&quot;: True or False, # Output only. Whether a fix is available for this package.
&quot;fixedCpeUri&quot;: &quot;A String&quot;, # The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was fixed in. It is possible for this to be different from the affected_cpe_uri.
&quot;fixedPackage&quot;: &quot;A String&quot;, # The package this vulnerability was fixed in. It is possible for this to be different from the affected_package.
&quot;fixedVersion&quot;: { # Version contains structured information about the version of a package. # Required. The version of the package this vulnerability was fixed in. Setting this to VersionKind.MAXIMUM means no fix is yet available.
&quot;epoch&quot;: 42, # Used to correct mistakes in the version numbering scheme.
&quot;fullName&quot;: &quot;A String&quot;, # Human readable version string. This string is of the form :- and is only set when kind is NORMAL.
&quot;inclusive&quot;: True or False, # Whether this version is specifying part of an inclusive range. Grafeas does not have the capability to specify version ranges; instead we have fields that specify start version and end versions. At times this is insufficient - we also need to specify whether the version is included in the range or is excluded from the range. This boolean is expected to be set to true when the version is included in a range.
&quot;kind&quot;: &quot;A String&quot;, # Required. Distinguishes between sentinel MIN/MAX versions and normal versions.
&quot;name&quot;: &quot;A String&quot;, # Required only when version kind is NORMAL. The main part of the version name.
&quot;revision&quot;: &quot;A String&quot;, # The iteration of the package build from the above version.
},
&quot;packageType&quot;: &quot;A String&quot;, # The type of package (e.g. OS, MAVEN, GO).
},
],
&quot;relatedUrls&quot;: [ # Output only. URLs related to this vulnerability.
{ # Metadata for any related URL information.
&quot;label&quot;: &quot;A String&quot;, # Label to describe usage of the URL.
&quot;url&quot;: &quot;A String&quot;, # Specific URL associated with the resource.
},
],
&quot;severity&quot;: &quot;A String&quot;, # Output only. The note provider assigned severity of this vulnerability.
&quot;shortDescription&quot;: &quot;A String&quot;, # Output only. A one sentence description of this vulnerability.
&quot;type&quot;: &quot;A String&quot;, # The type of package; whether native or non native (e.g., ruby gems, node.js packages, etc.).
},
},
],
}</pre>
</div>
<div class="method">
<code class="details" id="list_next">list_next(previous_request, previous_response)</code>
<pre>Retrieves the next page of results.
Args:
previous_request: The request for the previous page. (required)
previous_response: The response from the request for the previous page. (required)
Returns:
A request object that you can call &#x27;execute()&#x27; on to request the next
page. Returns None if there are no more items in the collection.
</pre>
</div>
</body></html>