Skip to content
This repository has been archived by the owner on Sep 16, 2023. It is now read-only.

Commit

Permalink
fix: Modify the bazel.BUILD file by hand to include the compliance pr…
Browse files Browse the repository at this point in the history
…otos which are not autogenerated (#791)

* fix: Modify the bazel.BUILD file by hand to include the compliance protos which are not autogenerated

PiperOrigin-RevId: 420306668

Source-Link: googleapis/googleapis@9a8910e

Source-Link: googleapis/googleapis-gen@24c9bfc
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiMjRjOWJmYzRkNTlmNTBhNDllMjJhNjA3MGQxYzIyOWY1MjNkZWZkYyJ9

* 🦉 Updates from OwlBot post-processor

See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md

Co-authored-by: Owl Bot <gcf-owl-bot[bot]@users.noreply.github.com>
  • Loading branch information
gcf-owl-bot[bot] and gcf-owl-bot[bot] committed Mar 24, 2022
1 parent 0998a83 commit a36ac4f
Show file tree
Hide file tree
Showing 6 changed files with 82 additions and 78 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -553,8 +553,8 @@ public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsReq
* }
* }</pre>
*
* @param parent The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* @param parent Required. The name of the project to get a vulnerability summary for in the form
* of `projects/[PROJECT_ID]`.
* @param filter The filter expression.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
Expand Down Expand Up @@ -583,8 +583,8 @@ public final VulnerabilityOccurrencesSummary getVulnerabilityOccurrencesSummary(
* }
* }</pre>
*
* @param parent The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* @param parent Required. The name of the project to get a vulnerability summary for in the form
* of `projects/[PROJECT_ID]`.
* @param filter The filter expression.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,9 @@
*/

/**
* The interfaces provided are listed below, along with usage samples.
* A client to Container Analysis API
*
* <p>The interfaces provided are listed below, along with usage samples.
*
* <p>======================= ContainerAnalysisClient =======================
*
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,51 +55,52 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "gle/api/field_behavior.proto\032\031google/api"
+ "/resource.proto\032\036google/iam/v1/iam_polic"
+ "y.proto\032\032google/iam/v1/policy.proto\032\037goo"
+ "gle/protobuf/timestamp.proto\032\036grafeas/v1"
+ "/vulnerability.proto\"\200\001\n)GetVulnerabilit"
+ "yOccurrencesSummaryRequest\022C\n\006parent\030\001 \001"
+ "(\tB3\372A-\n+cloudresourcemanager.googleapis"
+ ".com/Project\340A\002\022\016\n\006filter\030\002 \001(\t\"\220\002\n\037Vuln"
+ "erabilityOccurrencesSummary\022j\n\006counts\030\001 "
+ "\003(\0132Z.google.devtools.containeranalysis."
+ "v1.VulnerabilityOccurrencesSummary.Fixab"
+ "leTotalByDigest\032\200\001\n\024FixableTotalByDigest"
+ "\022\024\n\014resource_uri\030\001 \001(\t\022&\n\010severity\030\002 \001(\016"
+ "2\024.grafeas.v1.Severity\022\025\n\rfixable_count\030"
+ "\003 \001(\003\022\023\n\013total_count\030\004 \001(\0032\242\010\n\021Container"
+ "Analysis\022\322\001\n\014SetIamPolicy\022\".google.iam.v"
+ "1.SetIamPolicyRequest\032\025.google.iam.v1.Po"
+ "licy\"\206\001\202\323\344\223\002n\"./v1/{resource=projects/*/"
+ "notes/*}:setIamPolicy:\001*Z9\"4/v1/{resourc"
+ "e=projects/*/occurrences/*}:setIamPolicy"
+ ":\001*\332A\017resource,policy\022\312\001\n\014GetIamPolicy\022\""
+ ".google.iam.v1.GetIamPolicyRequest\032\025.goo"
+ "gle.iam.v1.Policy\"\177\202\323\344\223\002n\"./v1/{resource"
+ "=projects/*/notes/*}:getIamPolicy:\001*Z9\"4"
+ "/v1/{resource=projects/*/occurrences/*}:"
+ "getIamPolicy:\001*\332A\010resource\022\203\002\n\022TestIamPe"
+ "rmissions\022(.google.iam.v1.TestIamPermiss"
+ "ionsRequest\032).google.iam.v1.TestIamPermi"
+ "ssionsResponse\"\227\001\202\323\344\223\002z\"4/v1/{resource=p"
+ "rojects/*/notes/*}:testIamPermissions:\001*"
+ "Z?\":/v1/{resource=projects/*/occurrences"
+ "/*}:testIamPermissions:\001*\332A\024resource,per"
+ "missions\022\216\002\n\"GetVulnerabilityOccurrences"
+ "Summary\022O.google.devtools.containeranaly"
+ "sis.v1.GetVulnerabilityOccurrencesSummar"
+ "yRequest\032E.google.devtools.containeranal"
+ "ysis.v1.VulnerabilityOccurrencesSummary\""
+ "P\202\323\344\223\002:\0228/v1/{parent=projects/*}/occurre"
+ "nces:vulnerabilitySummary\332A\rparent,filte"
+ "r\032T\312A containeranalysis.googleapis.com\322A"
+ ".https://www.googleapis.com/auth/cloud-p"
+ "latformB\370\001\n\037com.google.containeranalysis"
+ ".v1P\001ZUgoogle.golang.org/genproto/google"
+ "apis/devtools/containeranalysis/v1;conta"
+ "ineranalysis\242\002\003GCA\252\002*Google.Cloud.DevToo"
+ "ls.ContainerAnalysis.V1\312\002!Google\\Cloud\\C"
+ "ontainerAnalysis\\V1\352\002$Google::Cloud::Con"
+ "tainerAnalysis::V1b\006proto3"
+ "gle/protobuf/timestamp.proto\032\027grafeas/v1"
+ "/common.proto\032\030grafeas/v1/grafeas.proto\032"
+ "\031grafeas/v1/severity.proto\"\200\001\n)GetVulner"
+ "abilityOccurrencesSummaryRequest\022C\n\006pare"
+ "nt\030\001 \001(\tB3\340A\002\372A-\n+cloudresourcemanager.g"
+ "oogleapis.com/Project\022\016\n\006filter\030\002 \001(\t\"\220\002"
+ "\n\037VulnerabilityOccurrencesSummary\022j\n\006cou"
+ "nts\030\001 \003(\0132Z.google.devtools.containerana"
+ "lysis.v1.VulnerabilityOccurrencesSummary"
+ ".FixableTotalByDigest\032\200\001\n\024FixableTotalBy"
+ "Digest\022\024\n\014resource_uri\030\001 \001(\t\022&\n\010severity"
+ "\030\002 \001(\0162\024.grafeas.v1.Severity\022\025\n\rfixable_"
+ "count\030\003 \001(\003\022\023\n\013total_count\030\004 \001(\0032\242\010\n\021Con"
+ "tainerAnalysis\022\322\001\n\014SetIamPolicy\022\".google"
+ ".iam.v1.SetIamPolicyRequest\032\025.google.iam"
+ ".v1.Policy\"\206\001\202\323\344\223\002n\"./v1/{resource=proje"
+ "cts/*/notes/*}:setIamPolicy:\001*Z9\"4/v1/{r"
+ "esource=projects/*/occurrences/*}:setIam"
+ "Policy:\001*\332A\017resource,policy\022\312\001\n\014GetIamPo"
+ "licy\022\".google.iam.v1.GetIamPolicyRequest"
+ "\032\025.google.iam.v1.Policy\"\177\202\323\344\223\002n\"./v1/{re"
+ "source=projects/*/notes/*}:getIamPolicy:"
+ "\001*Z9\"4/v1/{resource=projects/*/occurrenc"
+ "es/*}:getIamPolicy:\001*\332A\010resource\022\203\002\n\022Tes"
+ "tIamPermissions\022(.google.iam.v1.TestIamP"
+ "ermissionsRequest\032).google.iam.v1.TestIa"
+ "mPermissionsResponse\"\227\001\202\323\344\223\002z\"4/v1/{reso"
+ "urce=projects/*/notes/*}:testIamPermissi"
+ "ons:\001*Z?\":/v1/{resource=projects/*/occur"
+ "rences/*}:testIamPermissions:\001*\332A\024resour"
+ "ce,permissions\022\216\002\n\"GetVulnerabilityOccur"
+ "rencesSummary\022O.google.devtools.containe"
+ "ranalysis.v1.GetVulnerabilityOccurrences"
+ "SummaryRequest\032E.google.devtools.contain"
+ "eranalysis.v1.VulnerabilityOccurrencesSu"
+ "mmary\"P\202\323\344\223\002:\0228/v1/{parent=projects/*}/o"
+ "ccurrences:vulnerabilitySummary\332A\rparent"
+ ",filter\032T\312A containeranalysis.googleapis"
+ ".com\322A.https://www.googleapis.com/auth/c"
+ "loud-platformB\370\001\n\037com.google.containeran"
+ "alysis.v1P\001ZUgoogle.golang.org/genproto/"
+ "googleapis/devtools/containeranalysis/v1"
+ ";containeranalysis\242\002\003GCA\252\002*Google.Cloud."
+ "DevTools.ContainerAnalysis.V1\312\002!Google\\C"
+ "loud\\ContainerAnalysis\\V1\352\002$Google::Clou"
+ "d::ContainerAnalysis::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
Expand All @@ -112,7 +113,9 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.iam.v1.IamPolicyProto.getDescriptor(),
com.google.iam.v1.PolicyProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
io.grafeas.v1.Vulnerability.getDescriptor(),
io.grafeas.v1.Common.getDescriptor(),
io.grafeas.v1.GrafeasOuterClass.getDescriptor(),
io.grafeas.v1.SeverityOuterClass.getDescriptor(),
});
internal_static_google_devtools_containeranalysis_v1_GetVulnerabilityOccurrencesSummaryRequest_descriptor =
getDescriptor().getMessageTypes().get(0);
Expand Down Expand Up @@ -157,7 +160,9 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.iam.v1.IamPolicyProto.getDescriptor();
com.google.iam.v1.PolicyProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
io.grafeas.v1.Vulnerability.getDescriptor();
io.grafeas.v1.Common.getDescriptor();
io.grafeas.v1.GrafeasOuterClass.getDescriptor();
io.grafeas.v1.SeverityOuterClass.getDescriptor();
}

// @@protoc_insertion_point(outer_class_scope)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -155,7 +155,7 @@ public java.lang.String getParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down Expand Up @@ -582,7 +582,7 @@ public Builder mergeFrom(
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -607,7 +607,7 @@ public java.lang.String getParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -632,7 +632,7 @@ public com.google.protobuf.ByteString getParentBytes() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -656,7 +656,7 @@ public Builder setParent(java.lang.String value) {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -676,7 +676,7 @@ public Builder clearParent() {
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ public interface GetVulnerabilityOccurrencesSummaryRequestOrBuilder
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand All @@ -42,7 +42,7 @@ public interface GetVulnerabilityOccurrencesSummaryRequestOrBuilder
*
*
* <pre>
* The name of the project to get a vulnerability summary for in the form of
* Required. The name of the project to get a vulnerability summary for in the form of
* `projects/[PROJECT_ID]`.
* </pre>
*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
// Copyright 2019 Google LLC
// Copyright 2021 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
Expand All @@ -23,7 +23,9 @@ import "google/api/resource.proto";
import "google/iam/v1/iam_policy.proto";
import "google/iam/v1/policy.proto";
import "google/protobuf/timestamp.proto";
import "grafeas/v1/vulnerability.proto";
import "grafeas/v1/common.proto";
import "grafeas/v1/grafeas.proto";
import "grafeas/v1/severity.proto";

option csharp_namespace = "Google.Cloud.DevTools.ContainerAnalysis.V1";
option go_package = "google.golang.org/genproto/googleapis/devtools/containeranalysis/v1;containeranalysis";
Expand All @@ -48,8 +50,7 @@ option php_namespace = "Google\\Cloud\\ContainerAnalysis\\V1";
// image with the vulnerability referring to that note.
service ContainerAnalysis {
option (google.api.default_host) = "containeranalysis.googleapis.com";
option (google.api.oauth_scopes) =
"https://www.googleapis.com/auth/cloud-platform";
option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform";

// Sets the access control policy on the specified note or occurrence.
// Requires `containeranalysis.notes.setIamPolicy` or
Expand All @@ -59,8 +60,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest)
returns (google.iam.v1.Policy) {
rpc SetIamPolicy(google.iam.v1.SetIamPolicyRequest) returns (google.iam.v1.Policy) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:setIamPolicy"
body: "*"
Expand All @@ -80,8 +80,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest)
returns (google.iam.v1.Policy) {
rpc GetIamPolicy(google.iam.v1.GetIamPolicyRequest) returns (google.iam.v1.Policy) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:getIamPolicy"
body: "*"
Expand All @@ -100,8 +99,7 @@ service ContainerAnalysis {
// The resource takes the format `projects/[PROJECT_ID]/notes/[NOTE_ID]` for
// notes and `projects/[PROJECT_ID]/occurrences/[OCCURRENCE_ID]` for
// occurrences.
rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest)
returns (google.iam.v1.TestIamPermissionsResponse) {
rpc TestIamPermissions(google.iam.v1.TestIamPermissionsRequest) returns (google.iam.v1.TestIamPermissionsResponse) {
option (google.api.http) = {
post: "/v1/{resource=projects/*/notes/*}:testIamPermissions"
body: "*"
Expand All @@ -114,9 +112,7 @@ service ContainerAnalysis {
}

// Gets a summary of the number and severity of occurrences.
rpc GetVulnerabilityOccurrencesSummary(
GetVulnerabilityOccurrencesSummaryRequest)
returns (VulnerabilityOccurrencesSummary) {
rpc GetVulnerabilityOccurrencesSummary(GetVulnerabilityOccurrencesSummaryRequest) returns (VulnerabilityOccurrencesSummary) {
option (google.api.http) = {
get: "/v1/{parent=projects/*}/occurrences:vulnerabilitySummary"
};
Expand All @@ -126,12 +122,13 @@ service ContainerAnalysis {

// Request to get a vulnerability summary for some set of occurrences.
message GetVulnerabilityOccurrencesSummaryRequest {
// The name of the project to get a vulnerability summary for in the form of
// Required. The name of the project to get a vulnerability summary for in the form of
// `projects/[PROJECT_ID]`.
string parent = 1 [
(google.api.resource_reference).type =
"cloudresourcemanager.googleapis.com/Project",
(google.api.field_behavior) = REQUIRED
(google.api.field_behavior) = REQUIRED,
(google.api.resource_reference) = {
type: "cloudresourcemanager.googleapis.com/Project"
}
];

// The filter expression.
Expand Down

0 comments on commit a36ac4f

Please sign in to comment.