google-cloud-container_analysis-v1 1.2.0 → 1.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d7715695b2526e58b6f92b4f86cf8054cc30a25d491c2830452de8562740b27b
4
- data.tar.gz: fe7d7e34fb3d3c6f77565caa45e16f1e7f9689ffcde967d083556403125252cd
3
+ metadata.gz: f3de54014afc50641f92a17c29b867c47daa43c540c969852e4f1acb045ab081
4
+ data.tar.gz: 997ccbb168129468355858697090bad2cc49fe8ad127b37f7c36b18fbefd054a
5
5
  SHA512:
6
- metadata.gz: f02a732044ab97036d7012f3fbef1fb2e26d21249926116ccbf1a1cd2299eb098c7f0c0a6d94ef4d4525e4d6a1bd41a16386c7cef82c1e79eb928f429af5f178
7
- data.tar.gz: 1c185afddf59089a1721f3dc1dc51f03122931d5753d2000e3704644aa25be601da0de2ee6734b313175b0a87746b4fc87095572ef1148781555fa9338cc008a
6
+ metadata.gz: c567bc5575ad1cdcce251c685d75af76abbab6b0bb0dd276b38ebe3d9d85fa7d5be6d47b6eef932126ee436cc52336448bb1bdbe3dc84fc68f0dad8b15ffce68
7
+ data.tar.gz: 4551611886c5945843f151a47b3399755e7b8ec285084fdd87a38ab298268b1e74f4a336e6cd1782d2b154bcb02a7bd288ddf2f98a2e2ad6cf09eb39716e74f3
data/README.md CHANGED
@@ -1,6 +1,6 @@
1
1
  # Ruby Client for the Container Analysis V1 API
2
2
 
3
- An implementation of the Grafeas API, which stores, and enables querying and retrieval of critical metadata about all of your software artifacts.
3
+ This API is a prerequisite for leveraging Artifact Analysis scanning capabilities in both Artifact Registry and with Advanced Vulnerability Insights (runtime scanning) in GKE. In addition, the Container Analysis API is an implementation of the Grafeas API, which enables storing, querying, and retrieval of critical metadata about all of your software artifacts.
4
4
 
5
5
  The Container Analysis API is an implementation of Grafeas. It stores, and enables querying and retrieval of, critical metadata about all of your software artifacts.
6
6
 
@@ -517,8 +517,8 @@ module Google
517
517
  # the default parameter values, pass an empty Hash as a request object (see above).
518
518
  #
519
519
  # @param parent [::String]
520
- # Required. The name of the project to get a vulnerability summary for in the form of
521
- # `projects/[PROJECT_ID]`.
520
+ # Required. The name of the project to get a vulnerability summary for in the
521
+ # form of `projects/[PROJECT_ID]`.
522
522
  # @param filter [::String]
523
523
  # The filter expression.
524
524
  #
@@ -586,6 +586,95 @@ module Google
586
586
  raise ::Google::Cloud::Error.from_error(e)
587
587
  end
588
588
 
589
+ ##
590
+ # Generates an SBOM for the given resource.
591
+ #
592
+ # @overload export_sbom(request, options = nil)
593
+ # Pass arguments to `export_sbom` via a request object, either of type
594
+ # {::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest} or an equivalent Hash.
595
+ #
596
+ # @param request [::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest, ::Hash]
597
+ # A request object representing the call parameters. Required. To specify no
598
+ # parameters, or to keep all the default parameter values, pass an empty Hash.
599
+ # @param options [::Gapic::CallOptions, ::Hash]
600
+ # Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
601
+ #
602
+ # @overload export_sbom(name: nil, cloud_storage_location: nil)
603
+ # Pass arguments to `export_sbom` via keyword arguments. Note that at
604
+ # least one keyword argument is required. To specify no parameters, or to keep all
605
+ # the default parameter values, pass an empty Hash as a request object (see above).
606
+ #
607
+ # @param name [::String]
608
+ # Required. The name of the resource in the form of
609
+ # `projects/[PROJECT_ID]/resources/[RESOURCE_URL]`.
610
+ # @param cloud_storage_location [::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest::CloudStorageLocation, ::Hash]
611
+ # Optional. Empty placeholder to denote that this is a Google Cloud Storage
612
+ # export request.
613
+ #
614
+ # @yield [response, operation] Access the result along with the RPC operation
615
+ # @yieldparam response [::Google::Cloud::ContainerAnalysis::V1::ExportSBOMResponse]
616
+ # @yieldparam operation [::GRPC::ActiveCall::Operation]
617
+ #
618
+ # @return [::Google::Cloud::ContainerAnalysis::V1::ExportSBOMResponse]
619
+ #
620
+ # @raise [::Google::Cloud::Error] if the RPC is aborted.
621
+ #
622
+ # @example Basic example
623
+ # require "google/cloud/container_analysis/v1"
624
+ #
625
+ # # Create a client object. The client can be reused for multiple calls.
626
+ # client = Google::Cloud::ContainerAnalysis::V1::ContainerAnalysis::Client.new
627
+ #
628
+ # # Create a request. To set request fields, pass in keyword arguments.
629
+ # request = Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest.new
630
+ #
631
+ # # Call the export_sbom method.
632
+ # result = client.export_sbom request
633
+ #
634
+ # # The returned object is of type Google::Cloud::ContainerAnalysis::V1::ExportSBOMResponse.
635
+ # p result
636
+ #
637
+ def export_sbom request, options = nil
638
+ raise ::ArgumentError, "request must be provided" if request.nil?
639
+
640
+ request = ::Gapic::Protobuf.coerce request, to: ::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest
641
+
642
+ # Converts hash and nil to an options object
643
+ options = ::Gapic::CallOptions.new(**options.to_h) if options.respond_to? :to_h
644
+
645
+ # Customize the options with defaults
646
+ metadata = @config.rpcs.export_sbom.metadata.to_h
647
+
648
+ # Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
649
+ metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
650
+ lib_name: @config.lib_name, lib_version: @config.lib_version,
651
+ gapic_version: ::Google::Cloud::ContainerAnalysis::V1::VERSION
652
+ metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
653
+ metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
654
+
655
+ header_params = {}
656
+ if request.name
657
+ header_params["name"] = request.name
658
+ end
659
+
660
+ request_params_header = header_params.map { |k, v| "#{k}=#{v}" }.join("&")
661
+ metadata[:"x-goog-request-params"] ||= request_params_header
662
+
663
+ options.apply_defaults timeout: @config.rpcs.export_sbom.timeout,
664
+ metadata: metadata,
665
+ retry_policy: @config.rpcs.export_sbom.retry_policy
666
+
667
+ options.apply_defaults timeout: @config.timeout,
668
+ metadata: @config.metadata,
669
+ retry_policy: @config.retry_policy
670
+
671
+ @container_analysis_stub.call_rpc :export_sbom, request, options: options do |response, operation|
672
+ yield response, operation if block_given?
673
+ end
674
+ rescue ::GRPC::BadStatus => e
675
+ raise ::Google::Cloud::Error.from_error(e)
676
+ end
677
+
589
678
  ##
590
679
  # Configuration class for the ContainerAnalysis API.
591
680
  #
@@ -772,6 +861,11 @@ module Google
772
861
  # @return [::Gapic::Config::Method]
773
862
  #
774
863
  attr_reader :get_vulnerability_occurrences_summary
864
+ ##
865
+ # RPC-specific configuration for `export_sbom`
866
+ # @return [::Gapic::Config::Method]
867
+ #
868
+ attr_reader :export_sbom
775
869
 
776
870
  # @private
777
871
  def initialize parent_rpcs = nil
@@ -783,6 +877,8 @@ module Google
783
877
  @test_iam_permissions = ::Gapic::Config::Method.new test_iam_permissions_config
784
878
  get_vulnerability_occurrences_summary_config = parent_rpcs.get_vulnerability_occurrences_summary if parent_rpcs.respond_to? :get_vulnerability_occurrences_summary
785
879
  @get_vulnerability_occurrences_summary = ::Gapic::Config::Method.new get_vulnerability_occurrences_summary_config
880
+ export_sbom_config = parent_rpcs.export_sbom if parent_rpcs.respond_to? :export_sbom
881
+ @export_sbom = ::Gapic::Config::Method.new export_sbom_config
786
882
 
787
883
  yield self if block_given?
788
884
  end
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module ContainerAnalysis
23
23
  module V1
24
- VERSION = "1.2.0"
24
+ VERSION = "1.3.0"
25
25
  end
26
26
  end
27
27
  end
@@ -13,7 +13,7 @@ require 'google/iam/v1/policy_pb'
13
13
  require 'grafeas/v1/severity_pb'
14
14
 
15
15
 
16
- descriptor_data = "\n<google/devtools/containeranalysis/v1/containeranalysis.proto\x12$google.devtools.containeranalysis.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x19grafeas/v1/severity.proto\"\x80\x01\n)GetVulnerabilityOccurrencesSummaryRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x0e\n\x06\x66ilter\x18\x02 \x01(\t\"\x90\x02\n\x1fVulnerabilityOccurrencesSummary\x12j\n\x06\x63ounts\x18\x01 \x03(\x0b\x32Z.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary.FixableTotalByDigest\x1a\x80\x01\n\x14\x46ixableTotalByDigest\x12\x14\n\x0cresource_uri\x18\x01 \x01(\t\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x15\n\rfixable_count\x18\x03 \x01(\x03\x12\x13\n\x0btotal_count\x18\x04 \x01(\x03\x32\xa2\x08\n\x11\x43ontainerAnalysis\x12\xd2\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x86\x01\xda\x41\x0fresource,policy\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:setIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:setIamPolicy:\x01*\x12\xca\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x7f\xda\x41\x08resource\x82\xd3\xe4\x93\x02n\"./v1/{resource=projects/*/notes/*}:getIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:getIamPolicy:\x01*\x12\x83\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x97\x01\xda\x41\x14resource,permissions\x82\xd3\xe4\x93\x02z\"4/v1/{resource=projects/*/notes/*}:testIamPermissions:\x01*Z?\":/v1/{resource=projects/*/occurrences/*}:testIamPermissions:\x01*\x12\x8e\x02\n\"GetVulnerabilityOccurrencesSummary\x12O.google.devtools.containeranalysis.v1.GetVulnerabilityOccurrencesSummaryRequest\x1a\x45.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary\"P\xda\x41\rparent,filter\x82\xd3\xe4\x93\x02:\x12\x38/v1/{parent=projects/*}/occurrences:vulnerabilitySummary\x1aT\xca\x41 containeranalysis.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xf6\x01\n\x1f\x63om.google.containeranalysis.v1P\x01ZScloud.google.com/go/containeranalysis/apiv1/containeranalysispb;containeranalysispb\xa2\x02\x03GCA\xaa\x02*Google.Cloud.DevTools.ContainerAnalysis.V1\xca\x02!Google\\Cloud\\ContainerAnalysis\\V1\xea\x02$Google::Cloud::ContainerAnalysis::V1b\x06proto3"
16
+ descriptor_data = "\n<google/devtools/containeranalysis/v1/containeranalysis.proto\x12$google.devtools.containeranalysis.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x19grafeas/v1/severity.proto\"\xbd\x01\n\x11\x45xportSBOMRequest\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12s\n\x16\x63loud_storage_location\x18\x02 \x01(\x0b\x32L.google.devtools.containeranalysis.v1.ExportSBOMRequest.CloudStorageLocationB\x03\xe0\x41\x01H\x00\x1a\x16\n\x14\x43loudStorageLocationB\x08\n\x06target\"2\n\x12\x45xportSBOMResponse\x12\x1c\n\x14\x64iscovery_occurrence\x18\x01 \x01(\t\"\x80\x01\n)GetVulnerabilityOccurrencesSummaryRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x0e\n\x06\x66ilter\x18\x02 \x01(\t\"\x90\x02\n\x1fVulnerabilityOccurrencesSummary\x12j\n\x06\x63ounts\x18\x01 \x03(\x0b\x32Z.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary.FixableTotalByDigest\x1a\x80\x01\n\x14\x46ixableTotalByDigest\x12\x14\n\x0cresource_uri\x18\x01 \x01(\t\x12&\n\x08severity\x18\x02 \x01(\x0e\x32\x14.grafeas.v1.Severity\x12\x15\n\rfixable_count\x18\x03 \x01(\x03\x12\x13\n\x0btotal_count\x18\x04 \x01(\x03\x32\x90\x0e\n\x11\x43ontainerAnalysis\x12\xdb\x02\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x8f\x02\xda\x41\x0fresource,policy\x82\xd3\xe4\x93\x02\xf6\x01\"./v1/{resource=projects/*/notes/*}:setIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:setIamPolicy:\x01*Z?\":/v1/{resource=projects/*/locations/*/notes/*}:setIamPolicy:\x01*ZE\"@/v1/{resource=projects/*/locations/*/occurrences/*}:setIamPolicy:\x01*\x12\xd4\x02\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x88\x02\xda\x41\x08resource\x82\xd3\xe4\x93\x02\xf6\x01\"./v1/{resource=projects/*/notes/*}:getIamPolicy:\x01*Z9\"4/v1/{resource=projects/*/occurrences/*}:getIamPolicy:\x01*Z?\":/v1/{resource=projects/*/locations/*/notes/*}:getIamPolicy:\x01*ZE\"@/v1/{resource=projects/*/locations/*/occurrences/*}:getIamPolicy:\x01*\x12\x98\x03\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\xac\x02\xda\x41\x14resource,permissions\x82\xd3\xe4\x93\x02\x8e\x02\"4/v1/{resource=projects/*/notes/*}:testIamPermissions:\x01*Z?\":/v1/{resource=projects/*/occurrences/*}:testIamPermissions:\x01*ZE\"@/v1/{resource=projects/*/locations/*/notes/*}:testIamPermissions:\x01*ZK\"F/v1/{resource=projects/*/locations/*/occurrences/*}:testIamPermissions:\x01*\x12\xd8\x02\n\"GetVulnerabilityOccurrencesSummary\x12O.google.devtools.containeranalysis.v1.GetVulnerabilityOccurrencesSummaryRequest\x1a\x45.google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary\"\x99\x01\xda\x41\rparent,filter\x82\xd3\xe4\x93\x02\x82\x01\x12\x38/v1/{parent=projects/*}/occurrences:vulnerabilitySummaryZF\x12\x44/v1/{parent=projects/*/locations/*}/occurrences:vulnerabilitySummary\x12\xf9\x01\n\nExportSBOM\x12\x37.google.devtools.containeranalysis.v1.ExportSBOMRequest\x1a\x38.google.devtools.containeranalysis.v1.ExportSBOMResponse\"x\x82\xd3\xe4\x93\x02r\"-/v1/{name=projects/*/resources/**}:exportSBOM:\x01*Z>\"9/v1/{name=projects/*/locations/*/resources/**}:exportSBOM:\x01*\x1aT\xca\x41 containeranalysis.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xf6\x01\n\x1f\x63om.google.containeranalysis.v1P\x01ZScloud.google.com/go/containeranalysis/apiv1/containeranalysispb;containeranalysispb\xa2\x02\x03GCA\xaa\x02*Google.Cloud.DevTools.ContainerAnalysis.V1\xca\x02!Google\\Cloud\\ContainerAnalysis\\V1\xea\x02$Google::Cloud::ContainerAnalysis::V1b\x06proto3"
17
17
 
18
18
  pool = Google::Protobuf::DescriptorPool.generated_pool
19
19
 
@@ -43,6 +43,9 @@ module Google
43
43
  module Cloud
44
44
  module ContainerAnalysis
45
45
  module V1
46
+ ExportSBOMRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.ExportSBOMRequest").msgclass
47
+ ExportSBOMRequest::CloudStorageLocation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.ExportSBOMRequest.CloudStorageLocation").msgclass
48
+ ExportSBOMResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.ExportSBOMResponse").msgclass
46
49
  GetVulnerabilityOccurrencesSummaryRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.GetVulnerabilityOccurrencesSummaryRequest").msgclass
47
50
  VulnerabilityOccurrencesSummary = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary").msgclass
48
51
  VulnerabilityOccurrencesSummary::FixableTotalByDigest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.devtools.containeranalysis.v1.VulnerabilityOccurrencesSummary.FixableTotalByDigest").msgclass
@@ -73,6 +73,8 @@ module Google
73
73
  rpc :TestIamPermissions, ::Google::Iam::V1::TestIamPermissionsRequest, ::Google::Iam::V1::TestIamPermissionsResponse
74
74
  # Gets a summary of the number and severity of occurrences.
75
75
  rpc :GetVulnerabilityOccurrencesSummary, ::Google::Cloud::ContainerAnalysis::V1::GetVulnerabilityOccurrencesSummaryRequest, ::Google::Cloud::ContainerAnalysis::V1::VulnerabilityOccurrencesSummary
76
+ # Generates an SBOM for the given resource.
77
+ rpc :ExportSBOM, ::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest, ::Google::Cloud::ContainerAnalysis::V1::ExportSBOMResponse
76
78
  end
77
79
 
78
80
  Stub = Service.rpc_stub_class
@@ -221,6 +221,12 @@ module Google
221
221
  # Pythonic which are included in `protobuf>=5.29.x`. This feature will be
222
222
  # enabled by default 1 month after launching the feature in preview
223
223
  # packages.
224
+ # @!attribute [rw] unversioned_package_disabled
225
+ # @return [::Boolean]
226
+ # Disables generation of an unversioned Python package for this client
227
+ # library. This means that the module names will need to be versioned in
228
+ # import statements. For example `import google.cloud.library_v2` instead
229
+ # of `import google.cloud.library`.
224
230
  class ExperimentalFeatures
225
231
  include ::Google::Protobuf::MessageExts
226
232
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -409,6 +415,14 @@ module Google
409
415
  # @return [::Array<::String>]
410
416
  # An allowlist of the fully qualified names of RPCs that should be included
411
417
  # on public client surfaces.
418
+ # @!attribute [rw] generate_omitted_as_internal
419
+ # @return [::Boolean]
420
+ # Setting this to true indicates to the client generators that methods
421
+ # that would be excluded from the generation should instead be generated
422
+ # in a way that indicates these methods should not be consumed by
423
+ # end users. How this is expressed is up to individual language
424
+ # implementations to decide. Some examples may be: added annotations,
425
+ # obfuscated identifiers, or other language idiomatic patterns.
412
426
  class SelectiveGapicGeneration
413
427
  include ::Google::Protobuf::MessageExts
414
428
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -21,11 +21,44 @@ module Google
21
21
  module Cloud
22
22
  module ContainerAnalysis
23
23
  module V1
24
+ # The request to generate and export SBOM. Target must be specified for the
25
+ # request.
26
+ # @!attribute [rw] name
27
+ # @return [::String]
28
+ # Required. The name of the resource in the form of
29
+ # `projects/[PROJECT_ID]/resources/[RESOURCE_URL]`.
30
+ # @!attribute [rw] cloud_storage_location
31
+ # @return [::Google::Cloud::ContainerAnalysis::V1::ExportSBOMRequest::CloudStorageLocation]
32
+ # Optional. Empty placeholder to denote that this is a Google Cloud Storage
33
+ # export request.
34
+ class ExportSBOMRequest
35
+ include ::Google::Protobuf::MessageExts
36
+ extend ::Google::Protobuf::MessageExts::ClassMethods
37
+
38
+ # Empty placeholder to denote that this is a Google Cloud Storage
39
+ # export request.
40
+ class CloudStorageLocation
41
+ include ::Google::Protobuf::MessageExts
42
+ extend ::Google::Protobuf::MessageExts::ClassMethods
43
+ end
44
+ end
45
+
46
+ # The response from a call to ExportSBOM.
47
+ # @!attribute [rw] discovery_occurrence
48
+ # @return [::String]
49
+ # The name of the discovery occurrence in the form
50
+ # "projects/\\{project_id}/occurrences/\\{OCCURRENCE_ID}
51
+ # It can be used to track the progress of the SBOM export.
52
+ class ExportSBOMResponse
53
+ include ::Google::Protobuf::MessageExts
54
+ extend ::Google::Protobuf::MessageExts::ClassMethods
55
+ end
56
+
24
57
  # Request to get a vulnerability summary for some set of occurrences.
25
58
  # @!attribute [rw] parent
26
59
  # @return [::String]
27
- # Required. The name of the project to get a vulnerability summary for in the form of
28
- # `projects/[PROJECT_ID]`.
60
+ # Required. The name of the project to get a vulnerability summary for in the
61
+ # form of `projects/[PROJECT_ID]`.
29
62
  # @!attribute [rw] filter
30
63
  # @return [::String]
31
64
  # The filter expression.
metadata CHANGED
@@ -1,13 +1,13 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-container_analysis-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.2.0
4
+ version: 1.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  bindir: bin
9
9
  cert_chain: []
10
- date: 2025-01-29 00:00:00.000000000 Z
10
+ date: 2025-03-25 00:00:00.000000000 Z
11
11
  dependencies:
12
12
  - !ruby/object:Gem::Dependency
13
13
  name: gapic-common
@@ -132,8 +132,11 @@ required_rubygems_version: !ruby/object:Gem::Requirement
132
132
  - !ruby/object:Gem::Version
133
133
  version: '0'
134
134
  requirements: []
135
- rubygems_version: 3.6.2
135
+ rubygems_version: 3.6.5
136
136
  specification_version: 4
137
- summary: An implementation of the Grafeas API, which stores, and enables querying
138
- and retrieval of critical metadata about all of your software artifacts.
137
+ summary: This API is a prerequisite for leveraging Artifact Analysis scanning capabilities
138
+ in both Artifact Registry and with Advanced Vulnerability Insights (runtime scanning)
139
+ in GKE. In addition, the Container Analysis API is an implementation of the Grafeas
140
+ API, which enables storing, querying, and retrieval of critical metadata about all
141
+ of your software artifacts.
139
142
  test_files: []