google-apis-binaryauthorization_v1 0.27.0 → 0.28.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2d90c39f24d19819ebb370b9bde01f5622f2d10872b1fa77ea275f9ede3fb690
|
4
|
+
data.tar.gz: 5dba18ae6cce5c0d688b4f34b3e16d0fc9c5e6977934b1f2787054442e1d4220
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f0ec5fd8227c01799eec8991bcfe779fdcb2d85af800394d30b9640affd09508ecc7467f700ab0ac2872f3cfb3096666a1f0ffe82254967473faa1a91ac45348
|
7
|
+
data.tar.gz: ba17aae91cf84fa0c13f7213fdf9da756efae0d804e5420384e8b0d45b1185caf89289e37397583b351474e90bb1d8569f9d3680fa376c1ed74c8ef8afd27f90
|
data/CHANGELOG.md
CHANGED
@@ -44,8 +44,8 @@ module Google
|
|
44
44
|
# image, in the format `projects/*/attestors/*`. Each attestor must exist before
|
45
45
|
# a policy can reference it. To add an attestor to a policy the principal
|
46
46
|
# issuing the policy change request must be able to read the attestor resource.
|
47
|
-
# Note: this field must be non-empty when the evaluation_mode field specifies
|
48
|
-
# REQUIRE_ATTESTATION
|
47
|
+
# Note: this field must be non-empty when the `evaluation_mode` field specifies `
|
48
|
+
# REQUIRE_ATTESTATION`, otherwise it must be empty.
|
49
49
|
# Corresponds to the JSON property `requireAttestationsBy`
|
50
50
|
# @return [Array<String>]
|
51
51
|
attr_accessor :require_attestations_by
|
@@ -94,7 +94,7 @@ module Google
|
|
94
94
|
class AttestationAuthenticator
|
95
95
|
include Google::Apis::Core::Hashable
|
96
96
|
|
97
|
-
# Optional. A user-provided name for this AttestationAuthenticator
|
97
|
+
# Optional. A user-provided name for this `AttestationAuthenticator`. This field
|
98
98
|
# has no effect on the policy evaluation behavior except to improve readability
|
99
99
|
# of messages in evaluation results.
|
100
100
|
# Corresponds to the JSON property `displayName`
|
@@ -102,8 +102,9 @@ module Google
|
|
102
102
|
attr_accessor :display_name
|
103
103
|
|
104
104
|
# A bundle of PKIX public keys, used to authenticate attestation signatures.
|
105
|
-
# Generally, a signature is considered to be authenticated by a
|
106
|
-
# if any of the public keys verify it (i.e. it is an "OR" of
|
105
|
+
# Generally, a signature is considered to be authenticated by a `
|
106
|
+
# PkixPublicKeySet` if any of the public keys verify it (i.e. it is an "OR" of
|
107
|
+
# the keys).
|
107
108
|
# Corresponds to the JSON property `pkixPublicKeySet`
|
108
109
|
# @return [Google::Apis::BinaryauthorizationV1::PkixPublicKeySet]
|
109
110
|
attr_accessor :pkix_public_key_set
|
@@ -170,8 +171,8 @@ module Google
|
|
170
171
|
class AttestationSource
|
171
172
|
include Google::Apis::Core::Hashable
|
172
173
|
|
173
|
-
# The
|
174
|
-
#
|
174
|
+
# The IDs of the GCP projects storing the SLSA attestations as Container
|
175
|
+
# Analysis Occurrences.
|
175
176
|
# Corresponds to the JSON property `containerAnalysisAttestationProjects`
|
176
177
|
# @return [Array<String>]
|
177
178
|
attr_accessor :container_analysis_attestation_projects
|
@@ -242,10 +243,11 @@ module Google
|
|
242
243
|
|
243
244
|
# ASCII-armored representation of a PGP public key, as the entire output by the
|
244
245
|
# command `gpg --export --armor foo@example.com` (either LF or CRLF line endings)
|
245
|
-
# . When using this field, `id` should be left blank. The
|
246
|
-
# will calculate the ID and fill it in automatically.
|
247
|
-
# as the OpenPGP RFC4880 V4 fingerprint,
|
248
|
-
# is provided by the caller, it will be
|
246
|
+
# . When using this field, `id` should be left blank. The Binary Authorization
|
247
|
+
# API handlers will calculate the ID and fill it in automatically. Binary
|
248
|
+
# Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint,
|
249
|
+
# represented as upper-case hex. If `id` is provided by the caller, it will be
|
250
|
+
# overwritten by the API-calculated ID.
|
249
251
|
# Corresponds to the JSON property `asciiArmoredPgpPublicKey`
|
250
252
|
# @return [String]
|
251
253
|
attr_accessor :ascii_armored_pgp_public_key
|
@@ -255,18 +257,18 @@ module Google
|
|
255
257
|
# @return [String]
|
256
258
|
attr_accessor :comment
|
257
259
|
|
258
|
-
# The ID of this public key. Signatures verified by
|
259
|
-
# of the public key that can be used to verify them, and that ID
|
260
|
-
# contents of this field exactly. Additional restrictions on this
|
261
|
-
# imposed based on which public key type is encapsulated. See the
|
262
|
-
# on `public_key` cases below for details.
|
260
|
+
# The ID of this public key. Signatures verified by Binary Authorization must
|
261
|
+
# include the ID of the public key that can be used to verify them, and that ID
|
262
|
+
# must match the contents of this field exactly. Additional restrictions on this
|
263
|
+
# field can be imposed based on which public key type is encapsulated. See the
|
264
|
+
# documentation on `public_key` cases below for details.
|
263
265
|
# Corresponds to the JSON property `id`
|
264
266
|
# @return [String]
|
265
267
|
attr_accessor :id
|
266
268
|
|
267
|
-
# A public key in the PkixPublicKey format
|
268
|
-
#
|
269
|
-
#
|
269
|
+
# A public key in the PkixPublicKey [format](https://tools.ietf.org/html/rfc5280#
|
270
|
+
# section-4.1.2.7). Public keys of this type are typically textually encoded
|
271
|
+
# using the PEM format.
|
270
272
|
# Corresponds to the JSON property `pkixPublicKey`
|
271
273
|
# @return [Google::Apis::BinaryauthorizationV1::PkixPublicKey]
|
272
274
|
attr_accessor :pkix_public_key
|
@@ -360,21 +362,21 @@ module Google
|
|
360
362
|
end
|
361
363
|
end
|
362
364
|
|
363
|
-
# A single check to perform against a Pod. Checks are grouped into
|
364
|
-
# which are defined by the top-level policy.
|
365
|
+
# A single check to perform against a Pod. Checks are grouped into `CheckSet`
|
366
|
+
# objects, which are defined by the top-level policy.
|
365
367
|
class Check
|
366
368
|
include Google::Apis::Core::Hashable
|
367
369
|
|
368
370
|
# Optional. A special-case check that always denies. Note that this still only
|
369
|
-
# applies when the scope of the CheckSet applies and the image isn't exempted
|
370
|
-
# an image allowlist. This check is primarily useful for testing, or to set
|
371
|
-
# default behavior for all unmatched scopes to "deny".
|
371
|
+
# applies when the scope of the `CheckSet` applies and the image isn't exempted
|
372
|
+
# by an image allowlist. This check is primarily useful for testing, or to set
|
373
|
+
# the default behavior for all unmatched scopes to "deny".
|
372
374
|
# Corresponds to the JSON property `alwaysDeny`
|
373
375
|
# @return [Boolean]
|
374
376
|
attr_accessor :always_deny
|
375
377
|
alias_method :always_deny?, :always_deny
|
376
378
|
|
377
|
-
# Optional. A user-provided name for this
|
379
|
+
# Optional. A user-provided name for this check. This field has no effect on the
|
378
380
|
# policy evaluation behavior except to improve readability of messages in
|
379
381
|
# evaluation results.
|
380
382
|
# Corresponds to the JSON property `displayName`
|
@@ -434,22 +436,22 @@ module Google
|
|
434
436
|
end
|
435
437
|
|
436
438
|
# A conjunction of policy checks, scoped to a particular namespace or Kubernetes
|
437
|
-
# service account. In order for evaluation of a CheckSet to return "allowed"
|
438
|
-
# a given image in a given Pod, one of the following conditions must be
|
439
|
+
# service account. In order for evaluation of a `CheckSet` to return "allowed"
|
440
|
+
# for a given image in a given Pod, one of the following conditions must be
|
439
441
|
# satisfied: * The image is explicitly exempted by an entry in `image_allowlist`,
|
440
442
|
# OR * ALL of the `checks` evaluate to "allowed".
|
441
443
|
class CheckSet
|
442
444
|
include Google::Apis::Core::Hashable
|
443
445
|
|
444
446
|
# Optional. The checks to apply. The ultimate result of evaluating the check set
|
445
|
-
# will be "allow" if and only if every check in
|
447
|
+
# will be "allow" if and only if every check in `checks` evaluates to "allow".
|
446
448
|
# If `checks` is empty, the default behavior is "always allow".
|
447
449
|
# Corresponds to the JSON property `checks`
|
448
450
|
# @return [Array<Google::Apis::BinaryauthorizationV1::Check>]
|
449
451
|
attr_accessor :checks
|
450
452
|
|
451
|
-
# Optional. A user-provided name for this CheckSet
|
452
|
-
# the policy evaluation behavior except to improve readability of messages in
|
453
|
+
# Optional. A user-provided name for this `CheckSet`. This field has no effect
|
454
|
+
# on the policy evaluation behavior except to improve readability of messages in
|
453
455
|
# evaluation results.
|
454
456
|
# Corresponds to the JSON property `displayName`
|
455
457
|
# @return [String]
|
@@ -460,7 +462,7 @@ module Google
|
|
460
462
|
# @return [Google::Apis::BinaryauthorizationV1::ImageAllowlist]
|
461
463
|
attr_accessor :image_allowlist
|
462
464
|
|
463
|
-
# A scope specifier for
|
465
|
+
# A scope specifier for `CheckSet` objects.
|
464
466
|
# Corresponds to the JSON property `scope`
|
465
467
|
# @return [Google::Apis::BinaryauthorizationV1::Scope]
|
466
468
|
attr_accessor :scope
|
@@ -553,21 +555,22 @@ module Google
|
|
553
555
|
class GkePolicy
|
554
556
|
include Google::Apis::Core::Hashable
|
555
557
|
|
556
|
-
# Optional. The
|
557
|
-
# account. Exactly one CheckSet will be evaluated for a given Pod (
|
558
|
-
# list is empty, in which case the behavior is "always allow"). If
|
559
|
-
#
|
560
|
-
# being evaluated, only the CheckSet with the MOST SPECIFIC
|
561
|
-
#
|
562
|
-
# matches a given service account (which must
|
563
|
-
# come before a CheckSet with a scope matching
|
564
|
-
# property is enforced by server-side validation. The
|
565
|
-
# restriction is to ensure that if more than one CheckSet
|
566
|
-
# the CheckSet that will be evaluated will always be the
|
567
|
-
# match (because if any other matches, it must be less
|
568
|
-
# is empty, the default behavior is to allow all
|
569
|
-
# empty, the last `check_sets` entry must always
|
570
|
-
# i.e. a catchall to handle any situation not
|
558
|
+
# Optional. The `CheckSet` objects to apply, scoped by namespace or namespace
|
559
|
+
# and service account. Exactly one `CheckSet` will be evaluated for a given Pod (
|
560
|
+
# unless the list is empty, in which case the behavior is "always allow"). If
|
561
|
+
# multiple `CheckSet` objects have scopes that match the namespace and service
|
562
|
+
# account of the Pod being evaluated, only the `CheckSet` with the MOST SPECIFIC
|
563
|
+
# scope will match. `CheckSet` objects must be listed in order of decreasing
|
564
|
+
# specificity, i.e. if a scope matches a given service account (which must
|
565
|
+
# include the namespace), it must come before a `CheckSet` with a scope matching
|
566
|
+
# just that namespace. This property is enforced by server-side validation. The
|
567
|
+
# purpose of this restriction is to ensure that if more than one `CheckSet`
|
568
|
+
# matches a given Pod, the `CheckSet` that will be evaluated will always be the
|
569
|
+
# first in the list to match (because if any other matches, it must be less
|
570
|
+
# specific). If `check_sets` is empty, the default behavior is to allow all
|
571
|
+
# images. If `check_sets` is non-empty, the last `check_sets` entry must always
|
572
|
+
# be a `CheckSet` with no scope set, i.e. a catchall to handle any situation not
|
573
|
+
# caught by the preceding `CheckSet` objects.
|
571
574
|
# Corresponds to the JSON property `checkSets`
|
572
575
|
# @return [Array<Google::Apis::BinaryauthorizationV1::CheckSet>]
|
573
576
|
attr_accessor :check_sets
|
@@ -739,7 +742,7 @@ module Google
|
|
739
742
|
end
|
740
743
|
end
|
741
744
|
|
742
|
-
# Response message for
|
745
|
+
# Response message for BinauthzManagementServiceV1.ListAttestors.
|
743
746
|
class ListAttestorsResponse
|
744
747
|
include Google::Apis::Core::Hashable
|
745
748
|
|
@@ -793,9 +796,9 @@ module Google
|
|
793
796
|
end
|
794
797
|
end
|
795
798
|
|
796
|
-
# A public key in the PkixPublicKey format
|
797
|
-
#
|
798
|
-
#
|
799
|
+
# A public key in the PkixPublicKey [format](https://tools.ietf.org/html/rfc5280#
|
800
|
+
# section-4.1.2.7). Public keys of this type are typically textually encoded
|
801
|
+
# using the PEM format.
|
799
802
|
class PkixPublicKey
|
800
803
|
include Google::Apis::Core::Hashable
|
801
804
|
|
@@ -825,8 +828,9 @@ module Google
|
|
825
828
|
end
|
826
829
|
|
827
830
|
# A bundle of PKIX public keys, used to authenticate attestation signatures.
|
828
|
-
# Generally, a signature is considered to be authenticated by a
|
829
|
-
# if any of the public keys verify it (i.e. it is an "OR" of
|
831
|
+
# Generally, a signature is considered to be authenticated by a `
|
832
|
+
# PkixPublicKeySet` if any of the public keys verify it (i.e. it is an "OR" of
|
833
|
+
# the keys).
|
830
834
|
class PkixPublicKeySet
|
831
835
|
include Google::Apis::Core::Hashable
|
832
836
|
|
@@ -860,8 +864,8 @@ module Google
|
|
860
864
|
# @return [Google::Apis::BinaryauthorizationV1::GkePolicy]
|
861
865
|
attr_accessor :gke_policy
|
862
866
|
|
863
|
-
# Output only. The relative resource name of the
|
864
|
-
# the form of `projects/*/platforms/*/policies/*`.
|
867
|
+
# Output only. The relative resource name of the Binary Authorization platform
|
868
|
+
# policy, in the form of `projects/*/platforms/*/policies/*`.
|
865
869
|
# Corresponds to the JSON property `name`
|
866
870
|
# @return [String]
|
867
871
|
attr_accessor :name
|
@@ -983,7 +987,7 @@ module Google
|
|
983
987
|
end
|
984
988
|
end
|
985
989
|
|
986
|
-
# A scope specifier for
|
990
|
+
# A scope specifier for `CheckSet` objects.
|
987
991
|
class Scope
|
988
992
|
include Google::Apis::Core::Hashable
|
989
993
|
|
@@ -993,8 +997,8 @@ module Google
|
|
993
997
|
# @return [String]
|
994
998
|
attr_accessor :kubernetes_namespace
|
995
999
|
|
996
|
-
# Optional. Matches a single Kubernetes service account, e.g.
|
997
|
-
# service-account
|
1000
|
+
# Optional. Matches a single Kubernetes service account, e.g. `my-namespace:my-
|
1001
|
+
# service-account`. `kubernetes_service_account` scope is always more specific
|
998
1002
|
# than `kubernetes_namespace` scope for the same namespace.
|
999
1003
|
# Corresponds to the JSON property `kubernetesServiceAccount`
|
1000
1004
|
# @return [String]
|
@@ -1216,19 +1220,20 @@ module Google
|
|
1216
1220
|
|
1217
1221
|
# Required. List of trusted directory patterns. A pattern is in the form "
|
1218
1222
|
# registry/path/to/directory". The registry domain part is defined as two or
|
1219
|
-
# more dot-separated words, e.g., us.pkg.dev
|
1220
|
-
# used in three ways as wildcards: 1. leading
|
1221
|
-
# registry subdomain (useful for location prefixes); 2. trailing
|
1222
|
-
# registry/ to match varying endings; 3. trailing
|
1223
|
-
# as well. For example: -- gcr.io/my-project/my-repo is valid to
|
1224
|
-
# directory --
|
1225
|
-
# valid to match varying prefixes -- gcr.io/my-project
|
1226
|
-
# directories in my-project -- gcr.io/my-project
|
1227
|
-
# in my-project -- gcr.i
|
1228
|
-
# specified -- sub*domain.gcr.io/nginx is not valid
|
1229
|
-
# trailing
|
1230
|
-
# leading
|
1231
|
-
# one leading
|
1223
|
+
# more dot-separated words, e.g., `us.pkg.dev`, or `gcr.io`. Additionally, `*`
|
1224
|
+
# can be used in three ways as wildcards: 1. leading `*` to match varying
|
1225
|
+
# prefixes in registry subdomain (useful for location prefixes); 2. trailing `*`
|
1226
|
+
# after registry/ to match varying endings; 3. trailing `**` after registry/ to
|
1227
|
+
# match "/" as well. For example: -- `gcr.io/my-project/my-repo` is valid to
|
1228
|
+
# match a single directory -- `*-docker.pkg.dev/my-project/my-repo` or `*.gcr.io/
|
1229
|
+
# my-project` are valid to match varying prefixes -- `gcr.io/my-project/*` will
|
1230
|
+
# match all direct directories in `my-project` -- `gcr.io/my-project/**` would
|
1231
|
+
# match all directories in `my-project` -- `gcr.i*` is not allowed since the
|
1232
|
+
# registry is not completely specified -- `sub*domain.gcr.io/nginx` is not valid
|
1233
|
+
# because only leading `*` or trailing `*` are allowed. -- `*pkg.dev/my-project/
|
1234
|
+
# my-repo` is not valid because leading `*` can only match subdomain -- `**-
|
1235
|
+
# docker.pkg.dev` is not valid because one leading `*` is allowed, and that it
|
1236
|
+
# cannot match `/`
|
1232
1237
|
# Corresponds to the JSON property `trustedDirPatterns`
|
1233
1238
|
# @return [Array<String>]
|
1234
1239
|
attr_accessor :trusted_dir_patterns
|
@@ -1249,11 +1254,11 @@ module Google
|
|
1249
1254
|
include Google::Apis::Core::Hashable
|
1250
1255
|
|
1251
1256
|
# Output only. This field will contain the service account email address that
|
1252
|
-
# this
|
1257
|
+
# this attestor will use as the principal when querying Container Analysis.
|
1253
1258
|
# Attestor administrators must grant this service account the IAM role needed to
|
1254
1259
|
# read attestations from the note_reference in Container Analysis (`
|
1255
1260
|
# containeranalysis.notes.occurrences.viewer`). This email address is fixed for
|
1256
|
-
# the lifetime of the
|
1261
|
+
# the lifetime of the attestor, but callers should not make any other
|
1257
1262
|
# assumptions about the service account email; future versions may use an email
|
1258
1263
|
# based on a different naming pattern.
|
1259
1264
|
# Corresponds to the JSON property `delegationServiceAccountEmail`
|
@@ -1367,8 +1372,8 @@ module Google
|
|
1367
1372
|
# @return [Google::Apis::BinaryauthorizationV1::AttestationSource]
|
1368
1373
|
attr_accessor :attestation_source
|
1369
1374
|
|
1370
|
-
# If true, require the image to be built from a top-level configuration.
|
1371
|
-
#
|
1375
|
+
# If true, require the image to be built from a top-level configuration. `
|
1376
|
+
# trusted_source_repo_patterns` specifies the repositories containing this
|
1372
1377
|
# configuration.
|
1373
1378
|
# Corresponds to the JSON property `configBasedBuildRequired`
|
1374
1379
|
# @return [Boolean]
|
@@ -1385,19 +1390,19 @@ module Google
|
|
1385
1390
|
attr_accessor :trusted_builder
|
1386
1391
|
|
1387
1392
|
# List of trusted source code repository URL patterns. These patterns match the
|
1388
|
-
# full repository URL without its scheme (e.g.
|
1389
|
-
# not include schemes. For example, the pattern
|
1390
|
-
# project/my-repo-name
|
1391
|
-
# my-project/my-repo-name
|
1392
|
-
# repo-name
|
1393
|
-
# pattern matches a URL either exactly or with
|
1394
|
-
# only two ways: 1. trailing
|
1395
|
-
# trailing
|
1396
|
-
# wildcards and can only occur at the end of the pattern after a
|
1397
|
-
# possible to match a URL that contains literal
|
1398
|
-
# my-project/my-repo
|
1399
|
-
# will match all direct repos in my-project -
|
1400
|
-
# in GitHub
|
1393
|
+
# full repository URL without its scheme (e.g. `https://`). The patterns must
|
1394
|
+
# not include schemes. For example, the pattern `source.cloud.google.com/my-
|
1395
|
+
# project/my-repo-name` matches the following URLs: - `source.cloud.google.com/
|
1396
|
+
# my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-
|
1397
|
+
# repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A
|
1398
|
+
# pattern matches a URL either exactly or with `*` wildcards. `*` can be used in
|
1399
|
+
# only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2.
|
1400
|
+
# trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be
|
1401
|
+
# used as wildcards and can only occur at the end of the pattern after a `/`. (
|
1402
|
+
# So it's not possible to match a URL that contains literal `*`.) For example: -
|
1403
|
+
# `github.com/my-project/my-repo` is valid to match a single repo - `github.com/
|
1404
|
+
# my-project/*` will match all direct repos in `my-project` - `github.com/**`
|
1405
|
+
# matches all repos in GitHub
|
1401
1406
|
# Corresponds to the JSON property `trustedSourceRepoPatterns`
|
1402
1407
|
# @return [Array<String>]
|
1403
1408
|
attr_accessor :trusted_source_repo_patterns
|
@@ -1421,33 +1426,33 @@ module Google
|
|
1421
1426
|
include Google::Apis::Core::Hashable
|
1422
1427
|
|
1423
1428
|
# Optional. A list of specific CVEs to ignore even if the vulnerability level
|
1424
|
-
# violates maximumUnfixableSeverity or maximumFixableSeverity
|
1425
|
-
# in the format of Container Analysis note id. For example: - CVE-2021-
|
1426
|
-
# CVE-2020-10543 The CVEs are applicable regardless of note provider
|
1427
|
-
# g., an entry of `CVE-2021-20305` will allow vulnerabilities with a
|
1428
|
-
# of either `projects/goog-vulnz/notes/CVE-2021-20305` or `projects/
|
1429
|
-
# PROJECT/notes/CVE-2021-20305`.
|
1429
|
+
# violates `maximumUnfixableSeverity` or `maximumFixableSeverity`. CVEs are
|
1430
|
+
# listed in the format of Container Analysis note id. For example: - CVE-2021-
|
1431
|
+
# 20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider
|
1432
|
+
# project, e.g., an entry of `CVE-2021-20305` will allow vulnerabilities with a
|
1433
|
+
# note name of either `projects/goog-vulnz/notes/CVE-2021-20305` or `projects/
|
1434
|
+
# CUSTOM-PROJECT/notes/CVE-2021-20305`.
|
1430
1435
|
# Corresponds to the JSON property `allowedCves`
|
1431
1436
|
# @return [Array<String>]
|
1432
1437
|
attr_accessor :allowed_cves
|
1433
1438
|
|
1434
1439
|
# Optional. A list of specific CVEs to always raise warnings about even if the
|
1435
|
-
# vulnerability level meets maximumUnfixableSeverity or
|
1436
|
-
# CVEs are listed in the format of Container Analysis
|
1437
|
-
# CVE-2021-20305 - CVE-2020-10543 The CVEs are
|
1438
|
-
# provider project, e.g., an entry of `CVE-2021-
|
1439
|
-
# vulnerabilities with a note name of either `projects/goog-
|
1440
|
-
# 20305` or `projects/CUSTOM-PROJECT/notes/CVE-2021-20305`.
|
1440
|
+
# vulnerability level meets `maximumUnfixableSeverity` or `
|
1441
|
+
# maximumFixableSeverity`. CVEs are listed in the format of Container Analysis
|
1442
|
+
# note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are
|
1443
|
+
# applicable regardless of note provider project, e.g., an entry of `CVE-2021-
|
1444
|
+
# 20305` will block vulnerabilities with a note name of either `projects/goog-
|
1445
|
+
# vulnz/notes/CVE-2021-20305` or `projects/CUSTOM-PROJECT/notes/CVE-2021-20305`.
|
1441
1446
|
# Corresponds to the JSON property `blockedCves`
|
1442
1447
|
# @return [Array<String>]
|
1443
1448
|
attr_accessor :blocked_cves
|
1444
1449
|
|
1445
1450
|
# Optional. The projects where vulnerabilities are stored as Container Analysis
|
1446
1451
|
# Occurrences. Each project is expressed in the resource format of `projects/[
|
1447
|
-
# PROJECT_ID]`, e.g., projects/my-gcp-project
|
1448
|
-
# project to fetch vulnerabilities, and all valid vulnerabilities will be
|
1449
|
-
# to check against the vulnerability policy. If no valid scan is found in
|
1450
|
-
# projects configured here, an error will be returned for the check.
|
1452
|
+
# PROJECT_ID]`, e.g., `projects/my-gcp-project`. An attempt will be made for
|
1453
|
+
# each project to fetch vulnerabilities, and all valid vulnerabilities will be
|
1454
|
+
# used to check against the vulnerability policy. If no valid scan is found in
|
1455
|
+
# all projects configured here, an error will be returned for the check.
|
1451
1456
|
# Corresponds to the JSON property `containerAnalysisVulnerabilityProjects`
|
1452
1457
|
# @return [Array<String>]
|
1453
1458
|
attr_accessor :container_analysis_vulnerability_projects
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module BinaryauthorizationV1
|
18
18
|
# Version of the google-apis-binaryauthorization_v1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.28.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.12.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20230901"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
@@ -88,8 +88,8 @@ module Google
|
|
88
88
|
|
89
89
|
# Creates or updates a project's policy, and returns a copy of the new policy. A
|
90
90
|
# policy is always updated as a whole, to avoid race conditions with concurrent
|
91
|
-
# policy enforcement (or management!) requests. Returns NOT_FOUND if the
|
92
|
-
# does not exist, INVALID_ARGUMENT if the request is malformed.
|
91
|
+
# policy enforcement (or management!) requests. Returns `NOT_FOUND` if the
|
92
|
+
# project does not exist, `INVALID_ARGUMENT` if the request is malformed.
|
93
93
|
# @param [String] name
|
94
94
|
# Output only. The resource name, in the format `projects/*/policy`. There is at
|
95
95
|
# most one policy per project.
|
@@ -123,9 +123,9 @@ module Google
|
|
123
123
|
execute_or_queue_command(command, &block)
|
124
124
|
end
|
125
125
|
|
126
|
-
# Creates an attestor, and returns a copy of the new attestor. Returns
|
127
|
-
# if the project does not exist, INVALID_ARGUMENT if the request is
|
128
|
-
# ALREADY_EXISTS if the attestor already exists.
|
126
|
+
# Creates an attestor, and returns a copy of the new attestor. Returns `
|
127
|
+
# NOT_FOUND` if the project does not exist, `INVALID_ARGUMENT` if the request is
|
128
|
+
# malformed, `ALREADY_EXISTS` if the attestor already exists.
|
129
129
|
# @param [String] parent
|
130
130
|
# Required. The parent of this attestor.
|
131
131
|
# @param [Google::Apis::BinaryauthorizationV1::Attestor] attestor_object
|
@@ -161,7 +161,7 @@ module Google
|
|
161
161
|
execute_or_queue_command(command, &block)
|
162
162
|
end
|
163
163
|
|
164
|
-
# Deletes an attestor. Returns NOT_FOUND if the attestor does not exist.
|
164
|
+
# Deletes an attestor. Returns `NOT_FOUND` if the attestor does not exist.
|
165
165
|
# @param [String] name
|
166
166
|
# Required. The name of the attestors to delete, in the format `projects/*/
|
167
167
|
# attestors/*`.
|
@@ -192,7 +192,7 @@ module Google
|
|
192
192
|
execute_or_queue_command(command, &block)
|
193
193
|
end
|
194
194
|
|
195
|
-
# Gets an attestor. Returns NOT_FOUND if the attestor does not exist.
|
195
|
+
# Gets an attestor. Returns `NOT_FOUND` if the attestor does not exist.
|
196
196
|
# @param [String] name
|
197
197
|
# Required. The name of the attestor to retrieve, in the format `projects/*/
|
198
198
|
# attestors/*`.
|
@@ -268,7 +268,7 @@ module Google
|
|
268
268
|
execute_or_queue_command(command, &block)
|
269
269
|
end
|
270
270
|
|
271
|
-
# Lists attestors. Returns INVALID_ARGUMENT if the project does not exist.
|
271
|
+
# Lists attestors. Returns `INVALID_ARGUMENT` if the project does not exist.
|
272
272
|
# @param [String] parent
|
273
273
|
# Required. The resource name of the project associated with the attestors, in
|
274
274
|
# the format `projects/*`.
|
@@ -384,7 +384,7 @@ module Google
|
|
384
384
|
execute_or_queue_command(command, &block)
|
385
385
|
end
|
386
386
|
|
387
|
-
# Updates an attestor. Returns NOT_FOUND if the attestor does not exist.
|
387
|
+
# Updates an attestor. Returns `NOT_FOUND` if the attestor does not exist.
|
388
388
|
# @param [String] name
|
389
389
|
# Required. The resource name, in the format: `projects/*/attestors/*`. This
|
390
390
|
# field may not be updated.
|
@@ -418,8 +418,8 @@ module Google
|
|
418
418
|
execute_or_queue_command(command, &block)
|
419
419
|
end
|
420
420
|
|
421
|
-
# Returns whether the given Attestation for the given image URI was signed by
|
422
|
-
# the given Attestor
|
421
|
+
# Returns whether the given `Attestation` for the given image URI was signed by
|
422
|
+
# the given `Attestor`
|
423
423
|
# @param [String] attestor
|
424
424
|
# Required. The resource name of the Attestor of the occurrence, in the format `
|
425
425
|
# projects/*/attestors/*`.
|
@@ -453,11 +453,11 @@ module Google
|
|
453
453
|
execute_or_queue_command(command, &block)
|
454
454
|
end
|
455
455
|
|
456
|
-
# Creates a platform policy, and returns a copy of it. Returns NOT_FOUND if
|
457
|
-
# project or platform doesn't exist, INVALID_ARGUMENT if the request is
|
458
|
-
# malformed, ALREADY_EXISTS if the policy already exists, and
|
459
|
-
# if the policy contains a platform-specific policy that does
|
460
|
-
# platform value specified in the URL.
|
456
|
+
# Creates a platform policy, and returns a copy of it. Returns `NOT_FOUND` if
|
457
|
+
# the project or platform doesn't exist, `INVALID_ARGUMENT` if the request is
|
458
|
+
# malformed, `ALREADY_EXISTS` if the policy already exists, and `
|
459
|
+
# INVALID_ARGUMENT` if the policy contains a platform-specific policy that does
|
460
|
+
# not match the platform value specified in the URL.
|
461
461
|
# @param [String] parent
|
462
462
|
# Required. The parent of this platform policy.
|
463
463
|
# @param [Google::Apis::BinaryauthorizationV1::PlatformPolicy] platform_policy_object
|
@@ -493,7 +493,7 @@ module Google
|
|
493
493
|
execute_or_queue_command(command, &block)
|
494
494
|
end
|
495
495
|
|
496
|
-
# Deletes a platform policy. Returns NOT_FOUND if the policy doesn't exist.
|
496
|
+
# Deletes a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
|
497
497
|
# @param [String] name
|
498
498
|
# Required. The name of the platform policy to delete, in the format `projects/*/
|
499
499
|
# platforms/*/policies/*`.
|
@@ -524,7 +524,7 @@ module Google
|
|
524
524
|
execute_or_queue_command(command, &block)
|
525
525
|
end
|
526
526
|
|
527
|
-
# Gets a platform policy. Returns NOT_FOUND if the policy doesn't exist.
|
527
|
+
# Gets a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
|
528
528
|
# @param [String] name
|
529
529
|
# Required. The name of the platform policy to retrieve in the format `projects/*
|
530
530
|
# /platforms/*/policies/*`.
|
@@ -555,8 +555,8 @@ module Google
|
|
555
555
|
execute_or_queue_command(command, &block)
|
556
556
|
end
|
557
557
|
|
558
|
-
# Lists platform policies owned by a project in the specified platform. Returns
|
559
|
-
# INVALID_ARGUMENT if the project or the platform doesn't exist.
|
558
|
+
# Lists platform policies owned by a project in the specified platform. Returns `
|
559
|
+
# INVALID_ARGUMENT` if the project or the platform doesn't exist.
|
560
560
|
# @param [String] parent
|
561
561
|
# Required. The resource name of the platform associated with the platform
|
562
562
|
# policies using the format `projects/*/platforms/*`.
|
@@ -596,10 +596,10 @@ module Google
|
|
596
596
|
execute_or_queue_command(command, &block)
|
597
597
|
end
|
598
598
|
|
599
|
-
# Replaces a platform policy. Returns NOT_FOUND if the policy doesn't exist.
|
599
|
+
# Replaces a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
|
600
600
|
# @param [String] name
|
601
|
-
# Output only. The relative resource name of the
|
602
|
-
# the form of `projects/*/platforms/*/policies/*`.
|
601
|
+
# Output only. The relative resource name of the Binary Authorization platform
|
602
|
+
# policy, in the form of `projects/*/platforms/*/policies/*`.
|
603
603
|
# @param [Google::Apis::BinaryauthorizationV1::PlatformPolicy] platform_policy_object
|
604
604
|
# @param [String] fields
|
605
605
|
# Selector specifying which fields to include in a partial response.
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-binaryauthorization_v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.28.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-09-17 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.28.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
75
75
|
- !ruby/object:Gem::Version
|
76
76
|
version: '0'
|
77
77
|
requirements: []
|
78
|
-
rubygems_version: 3.4.
|
78
|
+
rubygems_version: 3.4.19
|
79
79
|
signing_key:
|
80
80
|
specification_version: 4
|
81
81
|
summary: Simple REST client for Binary Authorization API V1
|