Skip to content

Commit 9a1c70b

Browse files
feat(containeranalysis): update the api
#### containeranalysis:v1alpha1 The following keys were added: - schemas.CisBenchmark (Total Keys: 5) - schemas.ComplianceNote (Total Keys: 9) - schemas.ComplianceOccurrence (Total Keys: 5) - schemas.ComplianceVersion (Total Keys: 4) - schemas.NonCompliantFile (Total Keys: 5) - schemas.Note.properties.compliance.$ref (Total Keys: 1) - schemas.Occurrence.properties.compliance.$ref (Total Keys: 1)
1 parent 975d3e2 commit 9a1c70b

7 files changed

+451
-10
lines changed

docs/dyn/containeranalysis_v1alpha1.projects.notes.html

Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,23 @@ <h3>Method Details</h3>
149149
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
150150
},
151151
},
152+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
153+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
154+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
155+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
156+
},
157+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
158+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
159+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
160+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
161+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
162+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
163+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
164+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
165+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
166+
},
167+
],
168+
},
152169
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
153170
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
154171
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
@@ -287,6 +304,23 @@ <h3>Method Details</h3>
287304
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
288305
},
289306
},
307+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
308+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
309+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
310+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
311+
},
312+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
313+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
314+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
315+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
316+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
317+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
318+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
319+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
320+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
321+
},
322+
],
323+
},
290324
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
291325
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
292326
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
@@ -448,6 +482,23 @@ <h3>Method Details</h3>
448482
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
449483
},
450484
},
485+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
486+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
487+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
488+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
489+
},
490+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
491+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
492+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
493+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
494+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
495+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
496+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
497+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
498+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
499+
},
500+
],
501+
},
451502
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
452503
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
453504
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
@@ -641,6 +692,23 @@ <h3>Method Details</h3>
641692
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
642693
},
643694
},
695+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
696+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
697+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
698+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
699+
},
700+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
701+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
702+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
703+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
704+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
705+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
706+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
707+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
708+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
709+
},
710+
],
711+
},
644712
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
645713
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
646714
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
@@ -795,6 +863,23 @@ <h3>Method Details</h3>
795863
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
796864
},
797865
},
866+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
867+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
868+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
869+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
870+
},
871+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
872+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
873+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
874+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
875+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
876+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
877+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
878+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
879+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
880+
},
881+
],
882+
},
798883
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
799884
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
800885
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.
@@ -932,6 +1017,23 @@ <h3>Method Details</h3>
9321017
&quot;signature&quot;: &quot;A String&quot;, # Signature of the related `BuildProvenance`, encoded in a base64 string.
9331018
},
9341019
},
1020+
&quot;compliance&quot;: { # ComplianceNote encapsulates all information about a specific compliance check. # A note describing a compliance check.
1021+
&quot;cisBenchmark&quot;: { # A compliance check that is a CIS benchmark. # Right now we only have one compliance type, but we may add additional types in the future.
1022+
&quot;profileLevel&quot;: 42, # The profile level of this CIS benchmark check.
1023+
&quot;severity&quot;: &quot;A String&quot;, # The severity level of this CIS benchmark check.
1024+
},
1025+
&quot;description&quot;: &quot;A String&quot;, # A description about this compliance check.
1026+
&quot;rationale&quot;: &quot;A String&quot;, # A rationale for the existence of this compliance check.
1027+
&quot;remediation&quot;: &quot;A String&quot;, # A description of remediation steps if the compliance check fails.
1028+
&quot;scanInstructions&quot;: &quot;A String&quot;, # Serialized scan instructions with a predefined format.
1029+
&quot;title&quot;: &quot;A String&quot;, # The title that identifies this compliance check.
1030+
&quot;version&quot;: [ # The OS and config versions the benchmark applies to.
1031+
{ # Describes the CIS benchmark version that is applicable to a given OS and os version.
1032+
&quot;cpeUri&quot;: &quot;A String&quot;, # The CPE URI (https://cpe.mitre.org/specification/) this benchmark is applicable to.
1033+
&quot;version&quot;: &quot;A String&quot;, # The version of the benchmark. This is set to the version of the OS-specific CIS document the benchmark is defined in.
1034+
},
1035+
],
1036+
},
9351037
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this note was created. This field can be used as a filter in list requests.
9361038
&quot;deployable&quot;: { # An artifact that can be deployed in some runtime. # A note describing something that can be deployed.
9371039
&quot;resourceUri&quot;: [ # Resource URI for the artifact being deployed.

docs/dyn/containeranalysis_v1alpha1.projects.notes.occurrences.html

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,6 +255,16 @@ <h3>Method Details</h3>
255255
},
256256
&quot;provenanceBytes&quot;: &quot;A String&quot;, # Serialized JSON representation of the provenance, used in generating the `BuildSignature` in the corresponding Result. After verifying the signature, `provenance_bytes` can be unmarshalled and compared to the provenance to confirm that it is unchanged. A base64-encoded string representation of the provenance bytes is used for the signature in order to interoperate with openssl which expects this format for signature verification. The serialized form is captured both to avoid ambiguity in how the provenance is marshalled to json as well to prevent incompatibilities with future changes.
257257
},
258+
&quot;compliance&quot;: { # An indication that the compliance checks in the associated ComplianceNote were not satisfied for particular resources or a specified reason. # Describes whether or not a resource passes compliance checks.
259+
&quot;nonComplianceReason&quot;: &quot;A String&quot;, # The reason for non compliance of these files.
260+
&quot;nonCompliantFiles&quot;: [ # A list of files which are violating compliance checks.
261+
{ # Details about files that caused a compliance check to fail.
262+
&quot;displayCommand&quot;: &quot;A String&quot;, # Command to display the non-compliant files.
263+
&quot;path&quot;: &quot;A String&quot;, # display_command is a single command that can be used to display a list of non compliant files. When there is no such command, we can also iterate a list of non compliant file using &#x27;path&#x27;. Empty if `display_command` is set.
264+
&quot;reason&quot;: &quot;A String&quot;, # Explains why a file is non compliant for a CIS check.
265+
},
266+
],
267+
},
258268
&quot;createTime&quot;: &quot;A String&quot;, # Output only. The time this `Occurrence` was created.
259269
&quot;deployment&quot;: { # The period during which some deployable was active in a runtime. # Describes the deployment of an artifact on a runtime.
260270
&quot;address&quot;: &quot;A String&quot;, # Address of the runtime element hosting this deployment.

0 commit comments

Comments
 (0)