<html><body>
<style>

body, h1, h2, h3, div, span, p, pre, a {
  margin: 0;
  padding: 0;
  border: 0;
  font-weight: inherit;
  font-style: inherit;
  font-size: 100%;
  font-family: inherit;
  vertical-align: baseline;
}

body {
  font-size: 13px;
  padding: 1em;
}

h1 {
  font-size: 26px;
  margin-bottom: 1em;
}

h2 {
  font-size: 24px;
  margin-bottom: 1em;
}

h3 {
  font-size: 20px;
  margin-bottom: 1em;
  margin-top: 1em;
}

pre, code {
  line-height: 1.5;
  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}

pre {
  margin-top: 0.5em;
}

h1, h2, h3, p {
  font-family: Arial, sans serif;
}

h1, h2, h3 {
  border-bottom: solid #CCC 1px;
}

.toc_element {
  margin-top: 0.5em;
}

.firstline {
  margin-left: 2 em;
}

.method  {
  margin-top: 1em;
  border: solid 1px #CCC;
  padding: 1em;
  background: #EEE;
}

.details {
  font-weight: bold;
  font-size: 14px;
}

</style>

<h1><a href="ondemandscanning_v1beta1.html">On-Demand Scanning API</a> . <a href="ondemandscanning_v1beta1.projects.html">projects</a> . <a href="ondemandscanning_v1beta1.projects.locations.html">locations</a> . <a href="ondemandscanning_v1beta1.projects.locations.scans.html">scans</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
  <code><a href="ondemandscanning_v1beta1.projects.locations.scans.vulnerabilities.html">vulnerabilities()</a></code>
</p>
<p class="firstline">Returns the vulnerabilities Resource.</p>

<p class="toc_element">
  <code><a href="#analyzePackages">analyzePackages(parent, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Initiates an analysis of the provided packages.</p>
<p class="toc_element">
  <code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<h3>Method Details</h3>
<div class="method">
    <code class="details" id="analyzePackages">analyzePackages(parent, body=None, x__xgafv=None)</code>
  <pre>Initiates an analysis of the provided packages.

Args:
  parent: string, Required. The parent of the resource for which analysis is requested. Format: projects/[project_name]/locations/[location] (required)
  body: object, The request body.
    The object takes the form of:

{ # AnalyzePackagesRequest is the request to analyze a list of packages and create Vulnerability Occurrences for it.
  &quot;packages&quot;: [ # The packages to analyze.
    {
      &quot;architecture&quot;: &quot;A String&quot;, # The architecture of the package.
      &quot;binarySourceInfo&quot;: [ # A bundle containing the binary and source information.
        {
          &quot;binaryVersion&quot;: { # The binary package. This is significant when the source is different than the binary itself. Historically if they&#x27;ve differed, we&#x27;ve stored the name of the source and its version in the package/version fields, but we should also store the binary package info, as that&#x27;s what&#x27;s actually installed.
            &quot;licenses&quot;: [ # The licenses associated with this package. Note that this has to go on the PackageVersion level, because we can have cases with images with the same source having different licences. E.g. in Alpine, musl and musl-utils both have the same origin musl, but have different sets of licenses.
              &quot;A String&quot;,
            ],
            &quot;name&quot;: &quot;A String&quot;,
            &quot;version&quot;: &quot;A String&quot;,
          },
          &quot;sourceVersion&quot;: { # The source package. Similar to the above, this is significant when the source is different than the binary itself. Since the top-level package/version fields are based on an if/else, we need a separate field for both binary and source if we want to know definitively where the data is coming from.
            &quot;licenses&quot;: [ # The licenses associated with this package. Note that this has to go on the PackageVersion level, because we can have cases with images with the same source having different licences. E.g. in Alpine, musl and musl-utils both have the same origin musl, but have different sets of licenses.
              &quot;A String&quot;,
            ],
            &quot;name&quot;: &quot;A String&quot;,
            &quot;version&quot;: &quot;A String&quot;,
          },
        },
      ],
      &quot;binaryVersion&quot;: { # DEPRECATED
        &quot;licenses&quot;: [ # The licenses associated with this package. Note that this has to go on the PackageVersion level, because we can have cases with images with the same source having different licences. E.g. in Alpine, musl and musl-utils both have the same origin musl, but have different sets of licenses.
          &quot;A String&quot;,
        ],
        &quot;name&quot;: &quot;A String&quot;,
        &quot;version&quot;: &quot;A String&quot;,
      },
      &quot;cpeUri&quot;: &quot;A String&quot;, # The cpe_uri in [cpe format] (https://cpe.mitre.org/specification/) in which the vulnerability may manifest. Examples include distro or storage location for vulnerable jar.
      &quot;dependencyChain&quot;: [ # The dependency chain between this package and the user&#x27;s artifact. List in order from the customer&#x27;s package under review first, to the current package last. Inclusive of the original package and the current package.
        { # Indicates a language package available between this package and the customer&#x27;s resource artifact.
          &quot;package&quot;: &quot;A String&quot;,
          &quot;version&quot;: &quot;A String&quot;,
        },
      ],
      &quot;fileLocation&quot;: [ # The path to the jar file / go binary file.
        { # Indicates the location at which a package was found.
          &quot;filePath&quot;: &quot;A String&quot;, # For jars that are contained inside .war files, this filepath can indicate the path to war file combined with the path to jar file.
          &quot;layerDetails&quot;: { # Details about the layer a package was found in.
            &quot;baseImages&quot;: [ # The base images the layer is found within.
              { # BaseImage describes a base image of a container image.
                &quot;layerCount&quot;: 42, # The number of layers that the base image is composed of.
                &quot;name&quot;: &quot;A String&quot;, # The name of the base image.
                &quot;repository&quot;: &quot;A String&quot;, # The repository name in which the base image is from.
              },
            ],
            &quot;chainId&quot;: &quot;A String&quot;, # The layer chain ID (sha256 hash) of the layer in the container image. https://github.com/opencontainers/image-spec/blob/main/config.md#layer-chainid
            &quot;command&quot;: &quot;A String&quot;, # The layer build command that was used to build the layer. This may not be found in all layers depending on how the container image is built.
            &quot;diffId&quot;: &quot;A String&quot;, # The diff ID (sha256 hash) of the layer in the container image.
            &quot;index&quot;: 42, # The index of the layer in the container image.
          },
        },
      ],
      &quot;hashDigest&quot;: &quot;A String&quot;, # HashDigest stores the SHA512 hash digest of the jar file if the package is of type Maven. This field will be unset for non Maven packages.
      &quot;layerDetails&quot;: { # Details about the layer a package was found in.
        &quot;baseImages&quot;: [ # The base images the layer is found within.
          { # BaseImage describes a base image of a container image.
            &quot;layerCount&quot;: 42, # The number of layers that the base image is composed of.
            &quot;name&quot;: &quot;A String&quot;, # The name of the base image.
            &quot;repository&quot;: &quot;A String&quot;, # The repository name in which the base image is from.
          },
        ],
        &quot;chainId&quot;: &quot;A String&quot;, # The layer chain ID (sha256 hash) of the layer in the container image. https://github.com/opencontainers/image-spec/blob/main/config.md#layer-chainid
        &quot;command&quot;: &quot;A String&quot;, # The layer build command that was used to build the layer. This may not be found in all layers depending on how the container image is built.
        &quot;diffId&quot;: &quot;A String&quot;, # The diff ID (sha256 hash) of the layer in the container image.
        &quot;index&quot;: 42, # The index of the layer in the container image.
      },
      &quot;licenses&quot;: [ # The list of licenses found that are related to a given package. Note that licenses may also be stored on the BinarySourceInfo. If there is no BinarySourceInfo (because there&#x27;s no concept of source vs binary), then it will be stored here, while if there are BinarySourceInfos, it will be stored there, as one source can have multiple binaries with different licenses.
        &quot;A String&quot;,
      ],
      &quot;maintainer&quot;: { # The maintainer of the package.
        &quot;email&quot;: &quot;A String&quot;,
        &quot;kind&quot;: &quot;A String&quot;,
        &quot;name&quot;: &quot;A String&quot;,
        &quot;url&quot;: &quot;A String&quot;,
      },
      &quot;os&quot;: &quot;A String&quot;, # The OS affected by a vulnerability Used to generate the cpe_uri for OS packages
      &quot;osVersion&quot;: &quot;A String&quot;, # The version of the OS Used to generate the cpe_uri for OS packages
      &quot;package&quot;: &quot;A String&quot;, # The package being analysed for vulnerabilities
      &quot;packageType&quot;: &quot;A String&quot;, # The type of package: os, maven, go, etc.
      &quot;patchedCve&quot;: [ # CVEs that this package is no longer vulnerable to
        &quot;A String&quot;,
      ],
      &quot;sourceVersion&quot;: { # DEPRECATED
        &quot;licenses&quot;: [ # The licenses associated with this package. Note that this has to go on the PackageVersion level, because we can have cases with images with the same source having different licences. E.g. in Alpine, musl and musl-utils both have the same origin musl, but have different sets of licenses.
          &quot;A String&quot;,
        ],
        &quot;name&quot;: &quot;A String&quot;,
        &quot;version&quot;: &quot;A String&quot;,
      },
      &quot;unused&quot;: &quot;A String&quot;,
      &quot;version&quot;: &quot;A String&quot;, # The version of the package being analysed
    },
  ],
  &quot;resourceUri&quot;: &quot;A String&quot;, # Required. The resource URI of the container image being scanned.
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # This resource represents a long-running operation that is the result of a network API call.
  &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress. If `true`, the operation is completed, and either `error` or `response` is available.
  &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for different programming environments, including REST APIs and RPC APIs. It is used by [gRPC](https://github.com/grpc). Each `Status` message contains three pieces of data: error code, error message, and error details. You can find out more about this error model and how to work with it in the [API Design Guide](https://cloud.google.com/apis/design/errors). # The error result of the operation in case of failure or cancellation.
    &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
    &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of message types for APIs to use.
      {
        &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
      },
    ],
    &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any user-facing error message should be localized and sent in the google.rpc.Status.details field, or localized by the client.
  },
  &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically contains progress information and common metadata such as create time. Some services might not provide such metadata. Any method that returns a long-running operation should document the metadata type, if any.
    &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
  },
  &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that originally returns it. If you use the default HTTP mapping, the `name` should be a resource name ending with `operations/{unique_id}`.
  &quot;response&quot;: { # The normal, successful response of the operation. If the original method returns no data on success, such as `Delete`, the response is `google.protobuf.Empty`. If the original method is standard `Get`/`Create`/`Update`, the response should be the resource. For other methods, the response should have the type `XxxResponse`, where `Xxx` is the original method name. For example, if the original method name is `TakeSnapshot()`, the inferred response type is `TakeSnapshotResponse`.
    &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
  },
}</pre>
</div>

<div class="method">
    <code class="details" id="close">close()</code>
  <pre>Close httplib2 connections.</pre>
</div>

</body></html>