Skip to content

Commit ea0911b

Browse files
feat(ondemandscanning): update the api
#### ondemandscanning:v1 The following keys were added: - schemas.Binary (Total Keys: 4) - schemas.PackageData.properties.binary.$ref (Total Keys: 1) #### ondemandscanning:v1beta1 The following keys were added: - schemas.Binary (Total Keys: 4) - schemas.PackageData.properties.binary.$ref (Total Keys: 1)
1 parent 68a2c13 commit ea0911b

File tree

4 files changed

+42
-2
lines changed

4 files changed

+42
-2
lines changed

docs/dyn/ondemandscanning_v1.projects.locations.scans.html

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,10 @@ <h3>Method Details</h3>
100100
&quot;packages&quot;: [ # The packages to analyze.
101101
{
102102
&quot;architecture&quot;: &quot;A String&quot;, # The architecture of the package.
103+
&quot;binary&quot;: { # The binary package. This is significant when the source is different than the binary itself. Historically if they&#x27;ve differed, we&#x27;ve stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that&#x27;s what&#x27;s actually installed. See https://b.corp.google.com/issues/175908657#comment15
104+
&quot;name&quot;: &quot;A String&quot;,
105+
&quot;version&quot;: &quot;A String&quot;,
106+
},
103107
&quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.
104108
&quot;dependencyChain&quot;: [ # The dependency chain between this package and the user&#x27;s artifact. List in order from the customer&#x27;s package under review first, to the current package last. Inclusive of the original package and the current package.
105109
{ # Indicates a language package available between this package and the customer&#x27;s resource artifact.

docs/dyn/ondemandscanning_v1beta1.projects.locations.scans.html

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,10 @@ <h3>Method Details</h3>
9999
&quot;packages&quot;: [ # The packages to analyze.
100100
{
101101
&quot;architecture&quot;: &quot;A String&quot;, # The architecture of the package.
102+
&quot;binary&quot;: { # The binary package. This is significant when the source is different than the binary itself. Historically if they&#x27;ve differed, we&#x27;ve stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that&#x27;s what&#x27;s actually installed. See https://b.corp.google.com/issues/175908657#comment15
103+
&quot;name&quot;: &quot;A String&quot;,
104+
&quot;version&quot;: &quot;A String&quot;,
105+
},
102106
&quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.
103107
&quot;dependencyChain&quot;: [ # The dependency chain between this package and the user&#x27;s artifact. List in order from the customer&#x27;s package under review first, to the current package last. Inclusive of the original package and the current package.
104108
{ # Indicates a language package available between this package and the customer&#x27;s resource artifact.

googleapiclient/discovery_cache/documents/ondemandscanning.v1.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@
339339
}
340340
}
341341
},
342-
"revision": "20230320",
342+
"revision": "20230327",
343343
"rootUrl": "https://ondemandscanning.googleapis.com/",
344344
"schemas": {
345345
"AliasContext": {
@@ -506,6 +506,18 @@
506506
},
507507
"type": "object"
508508
},
509+
"Binary": {
510+
"id": "Binary",
511+
"properties": {
512+
"name": {
513+
"type": "string"
514+
},
515+
"version": {
516+
"type": "string"
517+
}
518+
},
519+
"type": "object"
520+
},
509521
"BuildOccurrence": {
510522
"description": "Details of a build occurrence.",
511523
"id": "BuildOccurrence",
@@ -1730,6 +1742,10 @@
17301742
"description": "The architecture of the package.",
17311743
"type": "string"
17321744
},
1745+
"binary": {
1746+
"$ref": "Binary",
1747+
"description": "The binary package. This is significant when the source is different than the binary itself. Historically if they've differed, we've stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that's what's actually installed. See https://b.corp.google.com/issues/175908657#comment15"
1748+
},
17331749
"cpeUri": {
17341750
"description": "The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.",
17351751
"type": "string"

googleapiclient/discovery_cache/documents/ondemandscanning.v1beta1.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@
339339
}
340340
}
341341
},
342-
"revision": "20230320",
342+
"revision": "20230327",
343343
"rootUrl": "https://ondemandscanning.googleapis.com/",
344344
"schemas": {
345345
"AliasContext": {
@@ -502,6 +502,18 @@
502502
},
503503
"type": "object"
504504
},
505+
"Binary": {
506+
"id": "Binary",
507+
"properties": {
508+
"name": {
509+
"type": "string"
510+
},
511+
"version": {
512+
"type": "string"
513+
}
514+
},
515+
"type": "object"
516+
},
505517
"BuildOccurrence": {
506518
"description": "Details of a build occurrence.",
507519
"id": "BuildOccurrence",
@@ -1726,6 +1738,10 @@
17261738
"description": "The architecture of the package.",
17271739
"type": "string"
17281740
},
1741+
"binary": {
1742+
"$ref": "Binary",
1743+
"description": "The binary package. This is significant when the source is different than the binary itself. Historically if they've differed, we've stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that's what's actually installed. See https://b.corp.google.com/issues/175908657#comment15"
1744+
},
17291745
"cpeUri": {
17301746
"description": "The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.",
17311747
"type": "string"

0 commit comments

Comments
 (0)