googleapis
Version:
Google APIs Client Library for Node.js
1,286 lines (1,285 loc) • 108 kB
TypeScript
import { OAuth2Client, JWT, Compute, UserRefreshClient, BaseExternalAccountClient, GaxiosResponseWithHTTP2, GoogleConfigurable, MethodOptions, StreamMethodOptions, GlobalOptions, GoogleAuth, BodyResponseCallback, APIRequestContext } from 'googleapis-common';
import { Readable } from 'stream';
export declare namespace ondemandscanning_v1 {
export interface Options extends GlobalOptions {
version: 'v1';
}
interface StandardParameters {
/**
* Auth client or API Key for the request
*/
auth?: string | OAuth2Client | JWT | Compute | UserRefreshClient | BaseExternalAccountClient | GoogleAuth;
/**
* V1 error format.
*/
'$.xgafv'?: string;
/**
* OAuth access token.
*/
access_token?: string;
/**
* Data format for response.
*/
alt?: string;
/**
* JSONP
*/
callback?: string;
/**
* Selector specifying which fields to include in a partial response.
*/
fields?: string;
/**
* API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
*/
key?: string;
/**
* OAuth 2.0 token for the current user.
*/
oauth_token?: string;
/**
* Returns response with indentations and line breaks.
*/
prettyPrint?: boolean;
/**
* Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters.
*/
quotaUser?: string;
/**
* Legacy upload protocol for media (e.g. "media", "multipart").
*/
uploadType?: string;
/**
* Upload protocol for media (e.g. "raw", "multipart").
*/
upload_protocol?: string;
}
/**
* On-Demand Scanning API
*
* A service to scan container images for vulnerabilities.
*
* @example
* ```js
* const {google} = require('googleapis');
* const ondemandscanning = google.ondemandscanning('v1');
* ```
*/
export class Ondemandscanning {
context: APIRequestContext;
projects: Resource$Projects;
constructor(options: GlobalOptions, google?: GoogleConfigurable);
}
/**
* An alias to a repo revision.
*/
export interface Schema$AliasContext {
/**
* The alias kind.
*/
kind?: string | null;
/**
* The alias name.
*/
name?: string | null;
}
/**
* Indicates which analysis completed successfully. Multiple types of analysis can be performed on a single resource.
*/
export interface Schema$AnalysisCompleted {
analysisType?: string[] | null;
}
/**
* AnalyzePackagesMetadata contains metadata for an active scan of a container image.
*/
export interface Schema$AnalyzePackagesMetadata {
/**
* When the scan was created.
*/
createTime?: string | null;
/**
* The resource URI of the container image being scanned.
*/
resourceUri?: string | null;
}
/**
* AnalyzePackagesMetadata contains metadata for an active scan of a container image.
*/
export interface Schema$AnalyzePackagesMetadataV1 {
/**
* When the scan was created.
*/
createTime?: string | null;
/**
* The resource URI of the container image being scanned.
*/
resourceUri?: string | null;
}
/**
* AnalyzePackagesRequest is the request to analyze a list of packages and create Vulnerability Occurrences for it.
*/
export interface Schema$AnalyzePackagesRequestV1 {
/**
* [DEPRECATED] Whether to include OSV data in the scan. For backwards compatibility reasons, this field can be neither removed nor renamed.
*/
includeOsvData?: boolean | null;
/**
* The packages to analyze.
*/
packages?: Schema$PackageData[];
/**
* Required. The resource URI of the container image being scanned.
*/
resourceUri?: string | null;
}
/**
* AnalyzePackagesResponse contains the information necessary to find results for the given scan.
*/
export interface Schema$AnalyzePackagesResponse {
/**
* The name of the scan resource created by this successful scan.
*/
scan?: string | null;
}
/**
* AnalyzePackagesResponse contains the information necessary to find results for the given scan.
*/
export interface Schema$AnalyzePackagesResponseV1 {
/**
* The name of the scan resource created by this successful scan.
*/
scan?: string | null;
}
/**
* Artifact describes a build product.
*/
export interface Schema$Artifact {
/**
* Hash or checksum value of a binary, or Docker Registry 2.0 digest of a container.
*/
checksum?: string | null;
/**
* Artifact ID, if any; for container images, this will be a URL by digest like `gcr.io/projectID/imagename@sha256:123456`.
*/
id?: string | null;
/**
* Related artifact names. This may be the path to a binary or jar file, or in the case of a container build, the name used to push the container image to Google Container Registry, as presented to `docker push`. Note that a single Artifact ID can have multiple names, for example if two tags are applied to one image.
*/
names?: string[] | null;
}
/**
* Occurrence that represents a single "attestation". The authenticity of an attestation can be verified using the attached signature. If the verifier trusts the public key of the signer, then verifying the signature is sufficient to establish trust. In this circumstance, the authority to which this attestation is attached is primarily useful for lookup (how to find this attestation if you already know the authority and artifact to be verified) and intent (for which authority this attestation was intended to sign.
*/
export interface Schema$AttestationOccurrence {
/**
* One or more JWTs encoding a self-contained attestation. Each JWT encodes the payload that it verifies within the JWT itself. Verifier implementation SHOULD ignore the `serialized_payload` field when verifying these JWTs. If only JWTs are present on this AttestationOccurrence, then the `serialized_payload` SHOULD be left empty. Each JWT SHOULD encode a claim specific to the `resource_uri` of this Occurrence, but this is not validated by Grafeas metadata API implementations. The JWT itself is opaque to Grafeas.
*/
jwts?: Schema$Jwt[];
/**
* Required. The serialized payload that is verified by one or more `signatures`.
*/
serializedPayload?: string | null;
/**
* One or more signatures over `serialized_payload`. Verifier implementations should consider this attestation message verified if at least one `signature` verifies `serialized_payload`. See `Signature` in common.proto for more details on signature structure and verification.
*/
signatures?: Schema$Signature[];
}
/**
* BaseImage describes a base image of a container image.
*/
export interface Schema$BaseImage {
/**
* The number of layers that the base image is composed of.
*/
layerCount?: number | null;
/**
* The name of the base image.
*/
name?: string | null;
/**
* The repository name in which the base image is from.
*/
repository?: string | null;
}
export interface Schema$BinarySourceInfo {
/**
* The binary package. This is significant when the source is different than the binary itself. Historically if they've differed, we've stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that's what's actually installed.
*/
binaryVersion?: Schema$PackageVersion;
/**
* The source package. Similar to the above, this is significant when the source is different than the binary itself. Since the top-level package/version fields are based on an if/else, we need a separate field for both binary and source if we want to know definitively where the data is coming from.
*/
sourceVersion?: Schema$PackageVersion;
}
export interface Schema$BuildDefinition {
buildType?: string | null;
externalParameters?: {
[key: string]: any;
} | null;
internalParameters?: {
[key: string]: any;
} | null;
resolvedDependencies?: Schema$ResourceDescriptor[];
}
export interface Schema$BuilderConfig {
id?: string | null;
}
export interface Schema$BuildMetadata {
finishedOn?: string | null;
invocationId?: string | null;
startedOn?: string | null;
}
/**
* Details of a build occurrence.
*/
export interface Schema$BuildOccurrence {
/**
* Deprecated. See InTotoStatement for the replacement. In-toto Provenance representation as defined in spec.
*/
intotoProvenance?: Schema$InTotoProvenance;
/**
* In-Toto Slsa Provenance V1 represents a slsa provenance meeting the slsa spec, wrapped in an in-toto statement. This allows for direct jsonification of a to-spec in-toto slsa statement with a to-spec slsa provenance.
*/
inTotoSlsaProvenanceV1?: Schema$InTotoSlsaProvenanceV1;
/**
* In-toto Statement representation as defined in spec. The intoto_statement can contain any type of provenance. The serialized payload of the statement can be stored and signed in the Occurrence's envelope.
*/
intotoStatement?: Schema$InTotoStatement;
/**
* The actual provenance for the build.
*/
provenance?: Schema$BuildProvenance;
/**
* Serialized JSON representation of the provenance, used in generating the build signature in the corresponding build note. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
*/
provenanceBytes?: string | null;
}
/**
* Provenance of a build. Contains all information needed to verify the full details about the build from source to completion.
*/
export interface Schema$BuildProvenance {
/**
* Version string of the builder at the time this build was executed.
*/
builderVersion?: string | null;
/**
* Special options applied to this build. This is a catch-all field where build providers can enter any desired additional details.
*/
buildOptions?: {
[key: string]: string;
} | null;
/**
* Output of the build.
*/
builtArtifacts?: Schema$Artifact[];
/**
* Commands requested by the build.
*/
commands?: Schema$Command[];
/**
* Time at which the build was created.
*/
createTime?: string | null;
/**
* E-mail address of the user who initiated this build. Note that this was the user's e-mail address at the time the build was initiated; this address may not represent the same end-user for all time.
*/
creator?: string | null;
/**
* Time at which execution of the build was finished.
*/
endTime?: string | null;
/**
* Required. Unique identifier of the build.
*/
id?: string | null;
/**
* URI where any logs for this provenance were written.
*/
logsUri?: string | null;
/**
* ID of the project.
*/
projectId?: string | null;
/**
* Details of the Source input to the build.
*/
sourceProvenance?: Schema$Source;
/**
* Time at which execution of the build was started.
*/
startTime?: string | null;
/**
* Trigger identifier if the build was triggered automatically; empty if not.
*/
triggerId?: string | null;
}
/**
* The category to which the update belongs.
*/
export interface Schema$Category {
/**
* The identifier of the category.
*/
categoryId?: string | null;
/**
* The localized name of the category.
*/
name?: string | null;
}
export interface Schema$CISAKnownExploitedVulnerabilities {
/**
* Whether the vulnerability is known to have been leveraged as part of a ransomware campaign.
*/
knownRansomwareCampaignUse?: string | null;
}
/**
* A CloudRepoSourceContext denotes a particular revision in a Google Cloud Source Repo.
*/
export interface Schema$CloudRepoSourceContext {
/**
* An alias, which may be a branch or tag.
*/
aliasContext?: Schema$AliasContext;
/**
* The ID of the repo.
*/
repoId?: Schema$RepoId;
/**
* A revision ID.
*/
revisionId?: string | null;
}
/**
* Command describes a step performed as part of the build pipeline.
*/
export interface Schema$Command {
/**
* Command-line arguments used when executing this command.
*/
args?: string[] | null;
/**
* Working directory (relative to project source root) used when running this command.
*/
dir?: string | null;
/**
* Environment variables set before running this command.
*/
env?: string[] | null;
/**
* Optional unique identifier for this command, used in wait_for to reference this command as a dependency.
*/
id?: string | null;
/**
* Required. Name of the command, as presented on the command line, or if the command is packaged as a Docker container, as presented to `docker pull`.
*/
name?: string | null;
/**
* The ID(s) of the command(s) that this command depends on.
*/
waitFor?: string[] | null;
}
/**
* Indicates that the builder claims certain fields in this message to be complete.
*/
export interface Schema$Completeness {
/**
* If true, the builder claims that recipe.arguments is complete, meaning that all external inputs are properly captured in the recipe.
*/
arguments?: boolean | null;
/**
* If true, the builder claims that recipe.environment is claimed to be complete.
*/
environment?: boolean | null;
/**
* If true, the builder claims that materials are complete, usually through some controls to prevent network access. Sometimes called "hermetic".
*/
materials?: boolean | null;
}
/**
* An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason.
*/
export interface Schema$ComplianceOccurrence {
nonComplianceReason?: string | null;
nonCompliantFiles?: Schema$NonCompliantFile[];
/**
* The OS and config version the benchmark was run on.
*/
version?: Schema$ComplianceVersion;
}
/**
* Describes the CIS benchmark version that is applicable to a given OS and os version.
*/
export interface Schema$ComplianceVersion {
/**
* The name of the document that defines this benchmark, e.g. "CIS Container-Optimized OS".
*/
benchmarkDocument?: string | null;
/**
* The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
*/
cpeUri?: string | null;
/**
* The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
*/
version?: string | null;
}
/**
* Common Vulnerability Scoring System. For details, see https://www.first.org/cvss/specification-document This is a message we will try to use for storing various versions of CVSS rather than making a separate proto for storing a specific version.
*/
export interface Schema$CVSS {
attackComplexity?: string | null;
/**
* Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments.
*/
attackVector?: string | null;
authentication?: string | null;
availabilityImpact?: string | null;
/**
* The base score is a function of the base metric scores.
*/
baseScore?: number | null;
confidentialityImpact?: string | null;
exploitabilityScore?: number | null;
impactScore?: number | null;
integrityImpact?: string | null;
privilegesRequired?: string | null;
scope?: string | null;
userInteraction?: string | null;
}
/**
* The period during which some deployable was active in a runtime.
*/
export interface Schema$DeploymentOccurrence {
/**
* Address of the runtime element hosting this deployment.
*/
address?: string | null;
/**
* Configuration used to create this deployment.
*/
config?: string | null;
/**
* Required. Beginning of the lifetime of this deployment.
*/
deployTime?: string | null;
/**
* Platform hosting this deployment.
*/
platform?: string | null;
/**
* Output only. Resource URI for the artifact being deployed taken from the deployable field with the same name.
*/
resourceUri?: string[] | null;
/**
* End of the lifetime of this deployment.
*/
undeployTime?: string | null;
/**
* Identity of the user that triggered this deployment.
*/
userEmail?: string | null;
}
/**
* Provides information about the analysis status of a discovered resource.
*/
export interface Schema$DiscoveryOccurrence {
analysisCompleted?: Schema$AnalysisCompleted;
/**
* Indicates any errors encountered during analysis of a resource. There could be 0 or more of these errors.
*/
analysisError?: Schema$Status[];
/**
* The status of discovery for the resource.
*/
analysisStatus?: string | null;
/**
* When an error is encountered this will contain a LocalizedMessage under details to show to the user. The LocalizedMessage is output only and populated by the API.
*/
analysisStatusError?: Schema$Status;
/**
* Output only. The time occurrences related to this discovery occurrence were archived.
*/
archiveTime?: string | null;
/**
* Whether the resource is continuously analyzed.
*/
continuousAnalysis?: string | null;
/**
* The CPE of the resource being scanned.
*/
cpe?: string | null;
/**
* Files that make up the resource described by the occurrence.
*/
files?: Schema$File[];
/**
* The last time this resource was scanned.
*/
lastScanTime?: string | null;
/**
* The last time vulnerability scan results changed.
*/
lastVulnerabilityUpdateTime?: string | null;
/**
* The status of an SBOM generation.
*/
sbomStatus?: Schema$SBOMStatus;
}
/**
* Deprecated. Prefer to use a regular Occurrence, and populate the Envelope at the top level of the Occurrence.
*/
export interface Schema$DSSEAttestationOccurrence {
/**
* If doing something security critical, make sure to verify the signatures in this metadata.
*/
envelope?: Schema$Envelope;
statement?: Schema$InTotoStatement;
}
/**
* A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); \}
*/
export interface Schema$Empty {
}
/**
* MUST match https://github.com/secure-systems-lab/dsse/blob/master/envelope.proto. An authenticated message of arbitrary type.
*/
export interface Schema$Envelope {
payload?: string | null;
payloadType?: string | null;
signatures?: Schema$EnvelopeSignature[];
}
export interface Schema$EnvelopeSignature {
keyid?: string | null;
sig?: string | null;
}
export interface Schema$ExploitPredictionScoringSystem {
/**
* The percentile of the current score, the proportion of all scored vulnerabilities with the same or a lower EPSS score
*/
percentile?: number | null;
/**
* The EPSS score representing the probability [0-1] of exploitation in the wild in the next 30 days
*/
score?: number | null;
}
export interface Schema$File {
digest?: {
[key: string]: string;
} | null;
name?: string | null;
}
/**
* Container message for hashes of byte content of files, used in source messages to verify integrity of source input to the build.
*/
export interface Schema$FileHashes {
/**
* Required. Collection of file hashes.
*/
fileHash?: Schema$Hash[];
}
/**
* Indicates the location at which a package was found.
*/
export interface Schema$FileLocation {
/**
* For jars that are contained inside .war files, this filepath can indicate the path to war file combined with the path to jar file.
*/
filePath?: string | null;
layerDetails?: Schema$LayerDetails;
}
/**
* A set of properties that uniquely identify a given Docker image.
*/
export interface Schema$Fingerprint {
/**
* Required. The layer ID of the final layer in the Docker image's v1 representation.
*/
v1Name?: string | null;
/**
* Required. The ordered list of v2 blobs that represent a given image.
*/
v2Blob?: string[] | null;
/**
* Output only. The name of the image's v2 blobs computed via: [bottom] := v2_blobbottom := sha256(v2_blob[N] + " " + v2_name[N+1]) Only the name of the final blob is kept.
*/
v2Name?: string | null;
}
/**
* A SourceContext referring to a Gerrit project.
*/
export interface Schema$GerritSourceContext {
/**
* An alias, which may be a branch or tag.
*/
aliasContext?: Schema$AliasContext;
/**
* The full project name within the host. Projects may be nested, so "project/subproject" is a valid project name. The "repo name" is the hostURI/project.
*/
gerritProject?: string | null;
/**
* The URI of a running Gerrit instance.
*/
hostUri?: string | null;
/**
* A revision (commit) ID.
*/
revisionId?: string | null;
}
/**
* A GitSourceContext denotes a particular revision in a third party Git repository (e.g., GitHub).
*/
export interface Schema$GitSourceContext {
/**
* Git commit hash.
*/
revisionId?: string | null;
/**
* Git repository URL.
*/
url?: string | null;
}
/**
* BaseImage describes a base image of a container image.
*/
export interface Schema$GrafeasV1BaseImage {
/**
* The number of layers that the base image is composed of.
*/
layerCount?: number | null;
/**
* The name of the base image.
*/
name?: string | null;
/**
* The registry in which the base image is from.
*/
registry?: string | null;
/**
* The repository name in which the base image is from.
*/
repository?: string | null;
}
/**
* Indicates the location at which a package was found.
*/
export interface Schema$GrafeasV1FileLocation {
/**
* For jars that are contained inside .war files, this filepath can indicate the path to war file combined with the path to jar file.
*/
filePath?: string | null;
/**
* Each package found in a file should have its own layer metadata (that is, information from the origin layer of the package).
*/
layerDetails?: Schema$GrafeasV1LayerDetails;
}
/**
* Details about the layer a package was found in.
*/
export interface Schema$GrafeasV1LayerDetails {
/**
* The base images the layer is found within.
*/
baseImages?: Schema$GrafeasV1BaseImage[];
/**
* The layer chain ID (sha256 hash) of the layer in the container image. https://github.com/opencontainers/image-spec/blob/main/config.md#layer-chainid
*/
chainId?: string | null;
/**
* The layer build command that was used to build the layer. This may not be found in all layers depending on how the container image is built.
*/
command?: string | null;
/**
* The diff ID (typically a sha256 hash) of the layer in the container image.
*/
diffId?: string | null;
/**
* The index of the layer in the container image.
*/
index?: number | null;
}
/**
* Identifies the entity that executed the recipe, which is trusted to have correctly performed the operation and populated this provenance.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaBuilder {
id?: string | null;
}
/**
* Indicates that the builder claims certain fields in this message to be complete.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaCompleteness {
environment?: boolean | null;
materials?: boolean | null;
parameters?: boolean | null;
}
/**
* Describes where the config file that kicked off the build came from. This is effectively a pointer to the source where buildConfig came from.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaConfigSource {
digest?: {
[key: string]: string;
} | null;
entryPoint?: string | null;
uri?: string | null;
}
/**
* Identifies the event that kicked off the build.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaInvocation {
configSource?: Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaConfigSource;
environment?: {
[key: string]: any;
} | null;
parameters?: {
[key: string]: any;
} | null;
}
/**
* The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaMaterial {
digest?: {
[key: string]: string;
} | null;
uri?: string | null;
}
/**
* Other properties of the build.
*/
export interface Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaMetadata {
buildFinishedOn?: string | null;
buildInvocationId?: string | null;
buildStartedOn?: string | null;
completeness?: Schema$GrafeasV1SlsaProvenanceZeroTwoSlsaCompleteness;
reproducible?: boolean | null;
}
/**
* Container message for hash values.
*/
export interface Schema$Hash {
/**
* Required. The type of hash that was performed, e.g. "SHA-256".
*/
type?: string | null;
/**
* Required. The hash value.
*/
value?: string | null;
}
/**
* The unique identifier of the update.
*/
export interface Schema$Identity {
/**
* The revision number of the update.
*/
revision?: number | null;
/**
* The revision independent identifier of the update.
*/
updateId?: string | null;
}
/**
* Details of the derived image portion of the DockerImage relationship. This image would be produced from a Dockerfile with FROM .
*/
export interface Schema$ImageOccurrence {
/**
* Output only. This contains the base image URL for the derived image occurrence.
*/
baseResourceUrl?: string | null;
/**
* Output only. The number of layers by which this image differs from the associated image basis.
*/
distance?: number | null;
/**
* Required. The fingerprint of the derived image.
*/
fingerprint?: Schema$Fingerprint;
/**
* This contains layer-specific metadata, if populated it has length "distance" and is ordered with [distance] being the layer immediately following the base image and [1] being the final layer.
*/
layerInfo?: Schema$Layer[];
}
export interface Schema$InTotoProvenance {
/**
* required
*/
builderConfig?: Schema$BuilderConfig;
/**
* The collection of artifacts that influenced the build including sources, dependencies, build tools, base images, and so on. This is considered to be incomplete unless metadata.completeness.materials is true. Unset or null is equivalent to empty.
*/
materials?: string[] | null;
metadata?: Schema$Metadata;
/**
* Identifies the configuration used for the build. When combined with materials, this SHOULD fully describe the build, such that re-running this recipe results in bit-for-bit identical output (if the build is reproducible). required
*/
recipe?: Schema$Recipe;
}
export interface Schema$InTotoSlsaProvenanceV1 {
predicate?: Schema$SlsaProvenanceV1;
predicateType?: string | null;
subject?: Schema$Subject[];
/**
* InToto spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement
*/
_type?: string | null;
}
/**
* Spec defined at https://github.com/in-toto/attestation/tree/main/spec#statement The serialized InTotoStatement will be stored as Envelope.payload. Envelope.payloadType is always "application/vnd.in-toto+json".
*/
export interface Schema$InTotoStatement {
/**
* `https://slsa.dev/provenance/v0.1` for SlsaProvenance.
*/
predicateType?: string | null;
provenance?: Schema$InTotoProvenance;
slsaProvenance?: Schema$SlsaProvenance;
slsaProvenanceZeroTwo?: Schema$SlsaProvenanceZeroTwo;
subject?: Schema$Subject[];
/**
* Always `https://in-toto.io/Statement/v0.1`.
*/
_type?: string | null;
}
/**
* Justification provides the justification when the state of the assessment if NOT_AFFECTED.
*/
export interface Schema$Justification {
/**
* Additional details on why this justification was chosen.
*/
details?: string | null;
/**
* The justification type for this vulnerability.
*/
justificationType?: string | null;
}
export interface Schema$Jwt {
/**
* The compact encoding of a JWS, which is always three base64 encoded strings joined by periods. For details, see: https://tools.ietf.org/html/rfc7515.html#section-3.1
*/
compactJwt?: string | null;
}
/**
* Indicates a language package available between this package and the customer's resource artifact.
*/
export interface Schema$LanguagePackageDependency {
package?: string | null;
version?: string | null;
}
/**
* Layer holds metadata specific to a layer of a Docker image.
*/
export interface Schema$Layer {
/**
* The recovered arguments to the Dockerfile directive.
*/
arguments?: string | null;
/**
* Required. The recovered Dockerfile directive used to construct this layer. See https://docs.docker.com/engine/reference/builder/ for more information.
*/
directive?: string | null;
}
/**
* Details about the layer a package was found in.
*/
export interface Schema$LayerDetails {
/**
* The base images the layer is found within.
*/
baseImages?: Schema$BaseImage[];
/**
* The layer chain ID (sha256 hash) of the layer in the container image. https://github.com/opencontainers/image-spec/blob/main/config.md#layer-chainid
*/
chainId?: string | null;
/**
* The layer build command that was used to build the layer. This may not be found in all layers depending on how the container image is built.
*/
command?: string | null;
/**
* The diff ID (sha256 hash) of the layer in the container image.
*/
diffId?: string | null;
/**
* The index of the layer in the container image.
*/
index?: number | null;
}
/**
* License information.
*/
export interface Schema$License {
/**
* Comments
*/
comments?: string | null;
/**
* Often a single license can be used to represent the licensing terms. Sometimes it is necessary to include a choice of one or more licenses or some combination of license identifiers. Examples: "LGPL-2.1-only OR MIT", "LGPL-2.1-only AND MIT", "GPL-2.0-or-later WITH Bison-exception-2.2".
*/
expression?: string | null;
}
/**
* The response message for Operations.ListOperations.
*/
export interface Schema$ListOperationsResponse {
/**
* The standard List next-page token.
*/
nextPageToken?: string | null;
/**
* A list of operations that matches the specified filter in the request.
*/
operations?: Schema$Operation[];
/**
* Unordered list. Unreachable resources. Populated when the request sets `ListOperationsRequest.return_partial_success` and reads across collections. For example, when attempting to list all resources across all supported locations.
*/
unreachable?: string[] | null;
}
/**
* ListVulnerabilitiesResponse contains a single page of vulnerabilities resulting from a scan.
*/
export interface Schema$ListVulnerabilitiesResponseV1 {
/**
* A page token that can be used in a subsequent call to ListVulnerabilities to continue retrieving results.
*/
nextPageToken?: string | null;
/**
* The list of Vulnerability Occurrences resulting from a scan.
*/
occurrences?: Schema$Occurrence[];
}
/**
* An occurrence of a particular package installation found within a system's filesystem. E.g., glibc was found in `/var/lib/dpkg/status`.
*/
export interface Schema$Location {
/**
* Deprecated. The CPE URI in [CPE format](https://cpe.mitre.org/specification/)
*/
cpeUri?: string | null;
/**
* The path from which we gathered that this package/version is installed.
*/
path?: string | null;
/**
* Deprecated. The version installed at this location.
*/
version?: Schema$Version;
}
export interface Schema$Maintainer {
email?: string | null;
kind?: string | null;
name?: string | null;
url?: string | null;
}
export interface Schema$Material {
digest?: {
[key: string]: string;
} | null;
uri?: string | null;
}
/**
* Other properties of the build.
*/
export interface Schema$Metadata {
/**
* The timestamp of when the build completed.
*/
buildFinishedOn?: string | null;
/**
* Identifies the particular build invocation, which can be useful for finding associated logs or other ad-hoc analysis. The value SHOULD be globally unique, per in-toto Provenance spec.
*/
buildInvocationId?: string | null;
/**
* The timestamp of when the build started.
*/
buildStartedOn?: string | null;
/**
* Indicates that the builder claims certain fields in this message to be complete.
*/
completeness?: Schema$Completeness;
/**
* If true, the builder claims that running the recipe on materials will produce bit-for-bit identical output.
*/
reproducible?: boolean | null;
}
/**
* Details about files that caused a compliance check to fail. display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using 'path'.
*/
export interface Schema$NonCompliantFile {
/**
* Command to display the non-compliant files.
*/
displayCommand?: string | null;
/**
* Empty if `display_command` is set.
*/
path?: string | null;
/**
* Explains why a file is non compliant for a CIS check.
*/
reason?: string | null;
}
/**
* An instance of an analysis type that has been found on a resource.
*/
export interface Schema$Occurrence {
/**
* Describes an attestation of an artifact.
*/
attestation?: Schema$AttestationOccurrence;
/**
* Describes a verifiable build.
*/
build?: Schema$BuildOccurrence;
/**
* Describes a compliance violation on a linked resource.
*/
compliance?: Schema$ComplianceOccurrence;
/**
* Output only. The time this occurrence was created.
*/
createTime?: string | null;
/**
* Describes the deployment of an artifact on a runtime.
*/
deployment?: Schema$DeploymentOccurrence;
/**
* Describes when a resource was discovered.
*/
discovery?: Schema$DiscoveryOccurrence;
/**
* Describes an attestation of an artifact using dsse.
*/
dsseAttestation?: Schema$DSSEAttestationOccurrence;
/**
* https://github.com/secure-systems-lab/dsse
*/
envelope?: Schema$Envelope;
/**
* Describes how this resource derives from the basis in the associated note.
*/
image?: Schema$ImageOccurrence;
/**
* Output only. This explicitly denotes which of the occurrence details are specified. This field can be used as a filter in list requests.
*/
kind?: string | null;
/**
* Output only. The name of the occurrence in the form of `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]`.
*/
name?: string | null;
/**
* Required. Immutable. The analysis note associated with this occurrence, in the form of `projects/[PROVIDER_ID]/notes/[NOTE_ID]`. This field can be used as a filter in list requests.
*/
noteName?: string | null;
/**
* Describes the installation of a package on the linked resource.
*/
package?: Schema$PackageOccurrence;
/**
* A description of actions that can be taken to remedy the note.
*/
remediation?: string | null;
/**
* Required. Immutable. A URI that represents the resource for which the occurrence applies. For example, `https://gcr.io/project/image@sha256:123abc` for a Docker image.
*/
resourceUri?: string | null;
/**
* Describes a specific SBOM reference occurrences.
*/
sbomReference?: Schema$SBOMReferenceOccurrence;
/**
* Describes a secret.
*/
secret?: Schema$SecretOccurrence;
/**
* Output only. The time this occurrence was last updated.
*/
updateTime?: string | null;
/**
* Describes an available package upgrade on the linked resource.
*/
upgrade?: Schema$UpgradeOccurrence;
/**
* Describes a security vulnerability.
*/
vulnerability?: Schema$VulnerabilityOccurrence;
}
/**
* This resource represents a long-running operation that is the result of a network API call.
*/
export interface Schema$Operation {
/**
* If the value is `false`, it means the operation is still in progress. If `true`, the operation is completed, and either `error` or `response` is available.
*/
done?: boolean | null;
/**
* The error result of the operation in case of failure or cancellation.
*/
error?: Schema$Status;
/**
* Service-specific metadata associated with the operation. It typically contains progress information and common metadata such as create time. Some services might not provide such metadata. Any method that returns a long-running operation should document the metadata type, if any.
*/
metadata?: {
[key: string]: any;
} | null;
/**
* The server-assigned name, which is only unique within the same service that originally returns it. If you use the default HTTP mapping, the `name` should be a resource name ending with `operations/{unique_id\}`.
*/
name?: string | null;
/**
* The normal, successful response of the operation. If the original method returns no data on success, such as `Delete`, the response is `google.protobuf.Empty`. If the original method is standard `Get`/`Create`/`Update`, the response should be the resource. For other methods, the response should have the type `XxxResponse`, where `Xxx` is the original method name. For example, if the original method name is `TakeSnapshot()`, the inferred response type is `TakeSnapshotResponse`.
*/
response?: {
[key: string]: any;
} | null;
}
export interface Schema$PackageData {
/**
* The architecture of the package.
*/
architecture?: string | null;
/**
* A bundle containing the binary and source information.
*/
binarySourceInfo?: Schema$BinarySourceInfo[];
/**
* DEPRECATED
*/
binaryVersion?: Schema$PackageVersion;
/**
* The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.
*/
cpeUri?: string | null;
/**
* The dependency chain between this package and the user's artifact. List in order from the customer's package under review first, to the current package last. Inclusive of the original package and the current package.
*/
dependencyChain?: Schema$LanguagePackageDependency[];
/**
* The path to the jar file / go binary file.
*/
fileLocation?: Schema$FileLocation[];
/**
* HashDigest stores the SHA512 hash digest of the jar file if the package is of type Maven. This field will be unset for non Maven packages.
*/
hashDigest?: string | null;
layerDetails?: Schema$LayerDetails;
/**
* The list of licenses found that are related to a given package. Note that licenses may also be stored on the BinarySourceInfo. If there is no BinarySourceInfo (because there's no concept of source vs binary), then it will be stored here, while if there are BinarySourceInfos, it will be stored there, as one source can have multiple binaries with different licenses.
*/
licenses?: string[] | null;
/**
* The maintainer of the package.
*/
maintainer?: Schema$Maintainer;
/**
* The OS affected by a vulnerability Used to generate the cpe_uri for OS packages
*/
os?: string | null;
/**
* The version of the OS Used to generate the cpe_uri for OS packages
*/
osVersion?: string | null;
/**
* The package being analysed for vulnerabilities
*/
package?: string | null;
/**
* The type of package: os, maven, go, etc.
*/
packageType?: string | null;
/**
* CVEs that this package is no longer vulnerable to
*/
patchedCve?: string[] | null;
/**
* DEPRECATED
*/
sourceVersion?: Schema$PackageVersion;
unused?: string | null;
/**
* The version of the package being analysed
*/
version?: string | null;
}
/**
* A detail for a distro and package this vulnerability occurrence was found in and its associated fix (if one is available).
*/
export interface Schema$PackageIssue {
/**
* Required. The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was found in.
*/
affectedCpeUri?: string | null;
/**
* Required. The package this vulnerability was found in.
*/
affectedPackage?: string | null;
/**
* Required. The version of the package that is installed on the resource affected by this vulnerability.
*/
affectedVersion?: Schema$Version;
/**
* Output only. The distro or language system assigned severity for this vulnerability when that is available and note provider assigned severity when it is not available.
*/
effectiveSeverity?: string | null;
/**
* The location at which this package was found.
*/
fileLocation?: Schema$GrafeasV1FileLocation[];
/**
* Output only. Whether a fix is available for this package.
*/
fixAvailable?: boolean | null;
/**
* The [CPE URI](https://cpe.mitre.org/specification/) this vulnerability was fixed in. It is possible for this to be different from the affected_cpe_uri.
*/
fixedCpeUri?: string | null;
/**
* The package this vulnerability was fixed in. It is possible for this to be different from the affected_package.
*/
fixedPackage?: string | null;
/**
* Required. The version of the package this vulnerability was fixed in. Setting this to VersionKind.MAXIMUM means no fix is yet available.
*/
fixedVersion?: Schema$Version;
/**
* The type of package (e.g. OS, MAVEN, GO).
*/
packageType?: string | null;
}
/**
* Details on how a particular software package was installed on a system.
*/
export interface Schema$PackageOccurrence {
/**
* Output only. The CPU architecture for which packages in this distribution channel were built. Architecture will be blank for language packages.
*/
architecture?: string | null;
/**
* Output only. The cpe_uri in [CPE format](https://cpe.mitre.org/specification/) denoting the package manager version distributing a package. The cpe_uri will be blank for language packages.
*/
cpeUri?: string | null;
/**
* Licenses that have been declared by the authors of the package.
*/
license?: Schema$License;
/**
* All of the places within the filesystem versions of this package have been found.
*/
location?: Schema$Location[];
/**
* Required. Output only. The name of the installed package.
*/
name?: string | null;
/**
* Output only. The type of package; whether native or non native (e.g., ruby gems, node.js packages, etc.).
*/
packageType?: string | null;
/**
* Output only. The version of the package.
*/
version?: Schema$Version;
}
export interface Schema$PackageVersion {
/**
* The licenses associated with this package. Note that this has to go on the PackageVersion level, because we can have cases with images with the same source having different licences. E.g. in Alpine, musl and musl-utils both have the same origin musl, but have different sets of licenses.
*/
licenses?: string[] | null;