google-cloud-container_analysis-v1 1.0.0 → 1.0.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 552ec84af1cc849ae9d9515ff771057bca83301b3620d2ad28d6841fb2b33020
4
- data.tar.gz: 3285b9029ffd892516d3b9494936649bb9237057d9796f1a7e0d82e5dcae6053
3
+ metadata.gz: 69c378b45d2d4a8f5d62325a88692b8372567e84abcc5ba87c843bfe2cbba8fb
4
+ data.tar.gz: 4f125e81238888dafaffec07d1069717b00b255ea9a2cf05fd8958bc74c652a4
5
5
  SHA512:
6
- metadata.gz: 1e9af96c218453f1f82ed29e749f70463be5ebccc937c0ab79067fce9d0f2f366f1e0564202e8fff5e3e9eac72dd6402094b671aac2bb82d9a9d087a9dff9b1c
7
- data.tar.gz: 1273491145088be60957fe4f10a5171f24a0fd171c9b0fadbb736950b48a22391814dc9015b5af275ffc039d6d118e5a8af9d8708a80ac423541f72d525c9fee
6
+ metadata.gz: 3db8771cb6342ac36795594b3b64d84f7446cbee7aafacb81551dd8159144a88eba5c3eb52955aa79147b3f4f72a17f1951b41e4b33777c5bff1216d53e37675
7
+ data.tar.gz: 7bd8dd89d746c8f38c07625bd1a2eafe7ac0ded8425edade9a38f9550509c08d2cc8fd67b4ec225cf99a7b482d83f1a45abe557186ca65f853be48493d3a953e
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module ContainerAnalysis
23
23
  module V1
24
- VERSION = "1.0.0"
24
+ VERSION = "1.0.1"
25
25
  end
26
26
  end
27
27
  end
@@ -13,7 +13,7 @@ require 'google/iam/v1/policy_pb'
13
13
  require 'grafeas/v1/severity_pb'
14
14
 
15
15
 
16
- descriptor_data = "\n<google/devtools/containeranalysis/v1/containeranalysis.proto\x12$google.devtools.containeranalysis.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x19grafeas/v1/severity.proto\"\x80\x01\n)GetVulnerabilityOccurrencesSummaryRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x0e\n\x06\x66ilter\x18\x02 \x01(\t\"\x90\x02\n\x1fVulnerabilityOccurrencesSummary\x12j\n\x06\x63ounts\x18\x01 \x03(\x0b\x32Z.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary.FixableTotalByDigest\x1a\x80\x01\n\x14\x46ixableTotalByDigest\x12\x14\n\x0cresource_uri\x18\x01 \x01(\t\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x15\n\rfixable_count\x18\x03 \x01(\x03\x12\x13\n\x0btotal_count\x18\x04 \x01(\x03\x32\xa2\x08\n\x11\x43ontainerAnalysis\x12\xd2\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x86\x01\xda\x41\x0fresource,policy\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:setIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:setIamPolicy:\x01*\x12\xca\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x7f\xda\x41\x08resource\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:getIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:getIamPolicy:\x01*\x12\x83\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x97\x01\xda\x41\x14resource,permissions\x82\xd3\xe4\x93\x02z\"4/v1/{resource=projects/*/notes/*}:testIamPermissions:\x01*Z?\":/v1/{resource=projects/*/occurrences/*}:testIamPermissions:\x01*\x12\x8e\x02\n\"GetVulnerabilityOccurrencesSummary\x12O.google.devtools.containeranalysis.v1.GetVulnerabilityOccurrencesSummaryRequest\x1a\x45.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary\"P\xda\x41\rparent,filter\x82\xd3\xe4\x93\x02:\x12\x38/v1/{parent=projects/*}/occurrences:vulnerabilitySummary\x1aT\xca\x41 containeranalysis.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xf8\x01\n\x1f\x63om.google.containeranalysis.v1P\x01ZUgoogle.golang.org/genproto/googleapis/devtools/containeranalysis/v1;containeranalysis\xa2\x02\x03GCA\xaa\x02*Google.Cloud.DevTools.ContainerAnalysis.V1\xca\x02!Google\\Cloud\\ContainerAnalysis\\V1\xea\x02$Google::Cloud::ContainerAnalysis::V1b\x06proto3"
16
+ descriptor_data = "\n<google/devtools/containeranalysis/v1/containeranalysis.proto\x12$google.devtools.containeranalysis.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x19grafeas/v1/severity.proto\"\x80\x01\n)GetVulnerabilityOccurrencesSummaryRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x0e\n\x06\x66ilter\x18\x02 \x01(\t\"\x90\x02\n\x1fVulnerabilityOccurrencesSummary\x12j\n\x06\x63ounts\x18\x01 \x03(\x0b\x32Z.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary.FixableTotalByDigest\x1a\x80\x01\n\x14\x46ixableTotalByDigest\x12\x14\n\x0cresource_uri\x18\x01 \x01(\t\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x15\n\rfixable_count\x18\x03 \x01(\x03\x12\x13\n\x0btotal_count\x18\x04 \x01(\x03\x32\xa2\x08\n\x11\x43ontainerAnalysis\x12\xd2\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x86\x01\xda\x41\x0fresource,policy\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:setIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:setIamPolicy:\x01*\x12\xca\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x7f\xda\x41\x08resource\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:getIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:getIamPolicy:\x01*\x12\x83\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x97\x01\xda\x41\x14resource,permissions\x82\xd3\xe4\x93\x02z\"4/v1/{resource=projects/*/notes/*}:testIamPermissions:\x01*Z?\":/v1/{resource=projects/*/occurrences/*}:testIamPermissions:\x01*\x12\x8e\x02\n\"GetVulnerabilityOccurrencesSummary\x12O.google.devtools.containeranalysis.v1.GetVulnerabilityOccurrencesSummaryRequest\x1a\x45.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary\"P\xda\x41\rparent,filter\x82\xd3\xe4\x93\x02:\x12\x38/v1/{parent=projects/*}/occurrences:vulnerabilitySummary\x1aT\xca\x41 containeranalysis.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xf6\x01\n\x1f\x63om.google.containeranalysis.v1P\x01ZScloud.google.com/go/containeranalysis/apiv1/containeranalysispb;containeranalysispb\xa2\x02\x03GCA\xaa\x02*Google.Cloud.DevTools.ContainerAnalysis.V1\xca\x02!Google\\Cloud\\ContainerAnalysis\\V1\xea\x02$Google::Cloud::ContainerAnalysis::V1b\x06proto3"
17
17
 
18
18
  pool = Google::Protobuf::DescriptorPool.generated_pool
19
19
 
@@ -196,9 +196,26 @@ module Google
196
196
  # @!attribute [rw] common
197
197
  # @return [::Google::Api::CommonLanguageSettings]
198
198
  # Some settings.
199
+ # @!attribute [rw] experimental_features
200
+ # @return [::Google::Api::PythonSettings::ExperimentalFeatures]
201
+ # Experimental features to be included during client library generation.
199
202
  class PythonSettings
200
203
  include ::Google::Protobuf::MessageExts
201
204
  extend ::Google::Protobuf::MessageExts::ClassMethods
205
+
206
+ # Experimental features to be included during client library generation.
207
+ # These fields will be deprecated once the feature graduates and is enabled
208
+ # by default.
209
+ # @!attribute [rw] rest_async_io_enabled
210
+ # @return [::Boolean]
211
+ # Enables generation of asynchronous REST clients if `rest` transport is
212
+ # enabled. By default, asynchronous REST clients will not be generated.
213
+ # This feature will be enabled by default 1 month after launching the
214
+ # feature in preview packages.
215
+ class ExperimentalFeatures
216
+ include ::Google::Protobuf::MessageExts
217
+ extend ::Google::Protobuf::MessageExts::ClassMethods
218
+ end
202
219
  end
203
220
 
204
221
  # Settings for Node client libraries.
@@ -290,6 +307,13 @@ module Google
290
307
  # @return [::String]
291
308
  # The fully qualified name of the method, for which the options below apply.
292
309
  # This is used to find the method to apply the options.
310
+ #
311
+ # Example:
312
+ #
313
+ # publishing:
314
+ # method_settings:
315
+ # - selector: google.storage.control.v2.StorageControl.CreateFolder
316
+ # # method settings for CreateFolder...
293
317
  # @!attribute [rw] long_running
294
318
  # @return [::Google::Api::MethodSettings::LongRunning]
295
319
  # Describes settings to use for long-running operations when generating
@@ -298,17 +322,14 @@ module Google
298
322
  #
299
323
  # Example of a YAML configuration::
300
324
  #
301
- # publishing:
302
- # method_settings:
325
+ # publishing:
326
+ # method_settings:
303
327
  # - selector: google.cloud.speech.v2.Speech.BatchRecognize
304
328
  # long_running:
305
- # initial_poll_delay:
306
- # seconds: 60 # 1 minute
329
+ # initial_poll_delay: 60s # 1 minute
307
330
  # poll_delay_multiplier: 1.5
308
- # max_poll_delay:
309
- # seconds: 360 # 6 minutes
310
- # total_poll_timeout:
311
- # seconds: 54000 # 90 minutes
331
+ # max_poll_delay: 360s # 6 minutes
332
+ # total_poll_timeout: 54000s # 90 minutes
312
333
  # @!attribute [rw] auto_populated_fields
313
334
  # @return [::Array<::String>]
314
335
  # List of top-level fields of the request message, that should be
@@ -317,8 +338,8 @@ module Google
317
338
  #
318
339
  # Example of a YAML configuration:
319
340
  #
320
- # publishing:
321
- # method_settings:
341
+ # publishing:
342
+ # method_settings:
322
343
  # - selector: google.example.v1.ExampleService.CreateExample
323
344
  # auto_populated_fields:
324
345
  # - request_id
@@ -124,8 +124,13 @@ module Google
124
124
  # @return [::String]
125
125
  # The plural name used in the resource name and permission names, such as
126
126
  # 'projects' for the resource name of 'projects/\\{project}' and the permission
127
- # name of 'cloudresourcemanager.googleapis.com/projects.get'. It is the same
128
- # concept of the `plural` field in k8s CRD spec
127
+ # name of 'cloudresourcemanager.googleapis.com/projects.get'. One exception
128
+ # to this is for Nested Collections that have stuttering names, as defined
129
+ # in [AIP-122](https://google.aip.dev/122#nested-collections), where the
130
+ # collection ID in the resource name pattern does not necessarily directly
131
+ # match the `plural` value.
132
+ #
133
+ # It is the same concept of the `plural` field in k8s CRD spec
129
134
  # https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
130
135
  #
131
136
  # Note: The plural form is required even for singleton resources. See
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-container_analysis-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0
4
+ version: 1.0.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-08 00:00:00.000000000 Z
11
+ date: 2024-08-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common