Skip to content
This repository was archived by the owner on Sep 16, 2023. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -553,8 +553,8 @@ public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsReq
* }
* }</pre>
*
* @param parent The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* @param parent Required. The name of the project to get a vulnerability summary for in the form
* of `projects/[PROJECT_ID]`.
* @param filter The filter expression.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
Expand Down Expand Up @@ -583,8 +583,8 @@ public final VulnerabilityOccurrencesSummary getVulnerabilityOccurrencesSummary(
* }
* }</pre>
*
* @param parent The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* @param parent Required. The name of the project to get a vulnerability summary for in the form
* of `projects/[PROJECT_ID]`.
* @param filter The filter expression.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,9 @@
*/

/**
* The interfaces provided are listed below, along with usage samples.
* A client to Container Analysis API
*
* <p>The interfaces provided are listed below, along with usage samples.
*
* <p>======================= ContainerAnalysisClient =======================
*
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,51 +55,52 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "gle/api/field_behavior.proto\032\031google/api"
+ "/resource.proto\032\036google/iam/v1/iam_polic"
+ "y.proto\032\032google/iam/v1/policy.proto\032\037goo"
+ "gle/protobuf/timestamp.proto\032\036grafeas/v1"
+ "/vulnerability.proto\"\200\001\n)GetVulnerabilit"
+ "yOccurrencesSummaryRequest\022C\n\006parent\030\001 \001"
+ "(\tB3\372A-\n+cloudresourcemanager.googleapis"
+ ".com/Project\340A\002\022\016\n\006filter\030\002 \001(\t\"\220\002\n\037Vuln"
+ "erabilityOccurrencesSummary\022j\n\006counts\030\001 "
+ "\003(\0132Z.google.devtools.containeranalysis."
+ "v1.VulnerabilityOccurrencesSummary.Fixab"
+ "leTotalByDigest\032\200\001\n\024FixableTotalByDigest"
+ "\022\024\n\014resource_uri\030\001 \001(\t\022&\n\010severity\030\002 \001(\016"
+ "2\024.grafeas.v1.Severity\022\025\n\rfixable_count\030"
+ "\003 \001(\003\022\023\n\013total_count\030\004 \001(\0032\242\010\n\021Container"
+ "Analysis\022\322\001\n\014SetIamPolicy\022\".google.iam.v"
+ "1.SetIamPolicyRequest\032\025.google.iam.v1.Po"
+ "licy\"\206\001\202\323\344\223\002n\"./v1/{resource=projects/*/"
+ "notes/*}:setIamPolicy:\001*Z9\"4/v1/{resourc"
+ "e=projects/*/occurrences/*}:setIamPolicy"
+ ":\001*\332A\017resource,policy\022\312\001\n\014GetIamPolicy\022\""
+ ".google.iam.v1.GetIamPolicyRequest\032\025.goo"
+ "gle.iam.v1.Policy\"\177\202\323\344\223\002n\"./v1/{resource"
+ "=projects/*/notes/*}:getIamPolicy:\001*Z9\"4"
+ "/v1/{resource=projects/*/occurrences/*}:"
+ "getIamPolicy:\001*\332A\010resource\022\203\002\n\022TestIamPe"
+ "rmissions\022(.google.iam.v1.TestIamPermiss"
+ "ionsRequest\032).google.iam.v1.TestIamPermi"
+ "ssionsResponse\"\227\001\202\323\344\223\002z\"4/v1/{resource=p"
+ "rojects/*/notes/*}:testIamPermissions:\001*"
+ "Z?\":/v1/{resource=projects/*/occurrences"
+ "/*}:testIamPermissions:\001*\332A\024resource,per"
+ "missions\022\216\002\n\"GetVulnerabilityOccurrences"
+ "Summary\022O.google.devtools.containeranaly"
+ "sis.v1.GetVulnerabilityOccurrencesSummar"
+ "yRequest\032E.google.devtools.containeranal"
+ "ysis.v1.VulnerabilityOccurrencesSummary\""
+ "P\202\323\344\223\002:\0228/v1/{parent=projects/*}/occurre"
+ "nces:vulnerabilitySummary\332A\rparent,filte"
+ "r\032T\312A containeranalysis.googleapis.com\322A"
+ ".https://www.googleapis.com/auth/cloud-p"
+ "latformB\370\001\n\037com.google.containeranalysis"
+ ".v1P\001ZUgoogle.golang.org/genproto/google"
+ "apis/devtools/containeranalysis/v1;conta"
+ "ineranalysis\242\002\003GCA\252\002*Google.Cloud.DevToo"
+ "ls.ContainerAnalysis.V1\312\002!Google\\Cloud\\C"
+ "ontainerAnalysis\\V1\352\002$Google::Cloud::Con"
+ "tainerAnalysis::V1b\006proto3"
+ "gle/protobuf/timestamp.proto\032\027grafeas/v1"
+ "/common.proto\032\030grafeas/v1/grafeas.proto\032"
+ "\031grafeas/v1/severity.proto\"\200\001\n)GetVulner"
+ "abilityOccurrencesSummaryRequest\022C\n\006pare"
+ "nt\030\001 \001(\tB3\340A\002\372A-\n+cloudresourcemanager.g"
+ "oogleapis.com/Project\022\016\n\006filter\030\002 \001(\t\"\220\002"
+ "\n\037VulnerabilityOccurrencesSummary\022j\n\006cou"
+ "nts\030\001 \003(\0132Z.google.devtools.containerana"
+ "lysis.v1.VulnerabilityOccurrencesSummary"
+ ".FixableTotalByDigest\032\200\001\n\024FixableTotalBy"
+ "Digest\022\024\n\014resource_uri\030\001 \001(\t\022&\n\010severity"
+ "\030\002 \001(\0162\024.grafeas.v1.Severity\022\025\n\rfixable_"
+ "count\030\003 \001(\003\022\023\n\013total_count\030\004 \001(\0032\242\010\n\021Con"
+ "tainerAnalysis\022\322\001\n\014SetIamPolicy\022\".google"
+ ".iam.v1.SetIamPolicyRequest\032\025.google.iam"
+ ".v1.Policy\"\206\001\202\323\344\223\002n\"./v1/{resource=proje"
+ "cts/*/notes/*}:setIamPolicy:\001*Z9\"4/v1/{r"
+ "esource=projects/*/occurrences/*}:setIam"
+ "Policy:\001*\332A\017resource,policy\022\312\001\n\014GetIamPo"
+ "licy\022\".google.iam.v1.GetIamPolicyRequest"
+ "\032\025.google.iam.v1.Policy\"\177\202\323\344\223\002n\"./v1/{re"
+ "source=projects/*/notes/*}:getIamPolicy:"
+ "\001*Z9\"4/v1/{resource=projects/*/occurrenc"
+ "es/*}:getIamPolicy:\001*\332A\010resource\022\203\002\n\022Tes"
+ "tIamPermissions\022(.google.iam.v1.TestIamP"
+ "ermissionsRequest\032).google.iam.v1.TestIa"
+ "mPermissionsResponse\"\227\001\202\323\344\223\002z\"4/v1/{reso"
+ "urce=projects/*/notes/*}:testIamPermissi"
+ "ons:\001*Z?\":/v1/{resource=projects/*/occur"
+ "rences/*}:testIamPermissions:\001*\332A\024resour"
+ "ce,permissions\022\216\002\n\"GetVulnerabilityOccur"
+ "rencesSummary\022O.google.devtools.containe"
+ "ranalysis.v1.GetVulnerabilityOccurrences"
+ "SummaryRequest\032E.google.devtools.contain"
+ "eranalysis.v1.VulnerabilityOccurrencesSu"
+ "mmary\"P\202\323\344\223\002:\0228/v1/{parent=projects/*}/o"
+ "ccurrences:vulnerabilitySummary\332A\rparent"
+ ",filter\032T\312A containeranalysis.googleapis"
+ ".com\322A.https://www.googleapis.com/auth/c"
+ "loud-platformB\370\001\n\037com.google.containeran"
+ "alysis.v1P\001ZUgoogle.golang.org/genproto/"
+ "googleapis/devtools/containeranalysis/v1"
+ ";containeranalysis\242\002\003GCA\252\002*Google.Cloud."
+ "DevTools.ContainerAnalysis.V1\312\002!Google\\C"
+ "loud\\ContainerAnalysis\\V1\352\002$Google::Clou"
+ "d::ContainerAnalysis::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
Expand All @@ -112,7 +113,9 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.iam.v1.IamPolicyProto.getDescriptor(),
com.google.iam.v1.PolicyProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
io.grafeas.v1.Vulnerability.getDescriptor(),
io.grafeas.v1.Common.getDescriptor(),
io.grafeas.v1.GrafeasOuterClass.getDescriptor(),
io.grafeas.v1.SeverityOuterClass.getDescriptor(),
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This class is missing as per the compilation failure. #791 (comment)

Error:  /home/runner/work/java-containeranalysis/java-containeranalysis/proto-google-cloud-containeranalysis-v1/src/main/java/com/google/containeranalysis/v1/Containeranalysis.java:[118,28] cannot find symbol
  symbol:   class SeverityOuterClass
  location: package io.grafeas.v1

});
internal_static_google_devtools_containeranalysis_v1_GetVulnerabilityOccurrencesSummaryRequest_descriptor =
getDescriptor().getMessageTypes().get(0);
Expand Down Expand Up @@ -157,7 +160,9 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.iam.v1.IamPolicyProto.getDescriptor();
com.google.iam.v1.PolicyProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
io.grafeas.v1.Vulnerability.getDescriptor();
io.grafeas.v1.Common.getDescriptor();
io.grafeas.v1.GrafeasOuterClass.getDescriptor();
io.grafeas.v1.SeverityOuterClass.getDescriptor();
Copy link
Member

@suztomo suztomo Mar 17, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This class is missing as per the compilation failure. #791 (comment)

Error:  /home/runner/work/java-containeranalysis/java-containeranalysis/proto-google-cloud-containeranalysis-v1/src/main/java/com/google/containeranalysis/v1/Containeranalysis.java:[165,18] cannot find symbol
  symbol:   class SeverityOuterClass
  location: package io.grafeas.v1

Added question in cl/420306668

}

// @@protoc_insertion_point(outer_class_scope)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -155,7 +155,7 @@ public java.lang.String getParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down Expand Up @@ -582,7 +582,7 @@ public Builder mergeFrom(
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -607,7 +607,7 @@ public java.lang.String getParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -632,7 +632,7 @@ public com.google.protobuf.ByteString getParentBytes() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -656,7 +656,7 @@ public Builder setParent(java.lang.String value) {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -676,7 +676,7 @@ public Builder clearParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ public interface GetVulnerabilityOccurrencesSummaryRequestOrBuilder
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -42,7 +42,7 @@ public interface GetVulnerabilityOccurrencesSummaryRequestOrBuilder
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
// Copyright 2019 Google LLC
// Copyright 2021 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
Expand All @@ -23,7 +23,9 @@ import "google/api/resource.proto";
import "google/iam/v1/iam_policy.proto";
import "google/iam/v1/policy.proto";
import "google/protobuf/timestamp.proto";
import "grafeas/v1/vulnerability.proto";
import "grafeas/v1/common.proto";
import "grafeas/v1/grafeas.proto";
import "grafeas/v1/severity.proto";

option csharp_namespace = "Google.Cloud.DevTools.ContainerAnalysis.V1";
option go_package = "google.golang.org/genproto/googleapis/devtools/containeranalysis/v1;containeranalysis";
Expand All @@ -48,8 +50,7 @@ option php_namespace = "Google\\Cloud\\ContainerAnalysis\\V1";
// image with the vulnerability referring to that note.
service ContainerAnalysis {
option (google.api.default_host) = "containeranalysis.googleapis.com";
option (google.api.oauth_scopes) =
"https://www.googleapis.com/auth/cloud-platform";
option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform";

// Sets the access control policy on the specified note or occurrence.
// Requires `containeranalysis.notes.setIamPolicy` or
Expand All @@ -59,8 +60,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest)
returns (google.iam.v1.Policy) {
rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest) returns (google.iam.v1.Policy) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:setIamPolicy"
body: "*"
Expand All @@ -80,8 +80,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest)
returns (google.iam.v1.Policy) {
rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest) returns (google.iam.v1.Policy) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:getIamPolicy"
body: "*"
Expand All @@ -100,8 +99,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest)
returns (google.iam.v1.TestIamPermissionsResponse) {
rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest) returns (google.iam.v1.TestIamPermissionsResponse) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:testIamPermissions"
body: "*"
Expand All @@ -114,9 +112,7 @@ service ContainerAnalysis {
}

// Gets a summary of the number and severity of occurrences.
rpc GetVulnerabilityOccurrencesSummary(
GetVulnerabilityOccurrencesSummaryRequest)
returns (VulnerabilityOccurrencesSummary) {
rpc GetVulnerabilityOccurrencesSummary(GetVulnerabilityOccurrencesSummaryRequest) returns (VulnerabilityOccurrencesSummary) {
option (google.api.http) = {
get: "/v1/{parent=projects/*}/occurrences:vulnerabilitySummary"
};
Expand All @@ -126,12 +122,13 @@ service ContainerAnalysis {

// Request to get a vulnerability summary for some set of occurrences.
message GetVulnerabilityOccurrencesSummaryRequest {
// The name of the project to get a vulnerability summary for in the form of
// Required. The name of the project to get a vulnerability summary for in the form of
// `projects/[PROJECT_ID]`.
string parent = 1 [
(google.api.resource_reference).type =
"cloudresourcemanager.googleapis.com/Project",
(google.api.field_behavior) = REQUIRED
(google.api.field_behavior) = REQUIRED,
(google.api.resource_reference) = {
type: "cloudresourcemanager.googleapis.com/Project"
}
];

// The filter expression.
Expand Down