Foo foo = ...; Any any; any.PackFrom(foo); ... if (any.UnpackTo(&foo)) { ... }
GET /v1/search
字段名称 | 必填 | 可为空 | 类型 | 描述 | 格式 |
---|---|---|---|---|---|
code |
整数 |
int32 |
|||
message |
字符串 |
||||
details |
ProtobufAny 列表 |
Any
包含任意序列化的协议缓冲区消息以及描述序列化消息类型的 URL。
Protobuf 库提供实用函数或 Any 类型的附加生成方法来支持打包/解包 Any 值。
示例 1:在 C++ 中打包和解包消息。
Foo foo = ...; Any any; any.PackFrom(foo); ... if (any.UnpackTo(&foo)) { ... }
示例 2:在 Java 中打包和解包消息。
Foo foo = ...; Any any = Any.pack(foo); ... if (any.is(Foo.class)) { foo = any.unpack(Foo.class); } // or ... if (any.isSameTypeAs(Foo.getDefaultInstance())) { foo = any.unpack(Foo.getDefaultInstance()); }
Example 3: Pack and unpack a message in Python.
foo = Foo(...) any = Any() any.Pack(foo) ... if any.Is(Foo.DESCRIPTOR): any.Unpack(foo) ...
Example 4: Pack and unpack a message in Go
foo := &pb.Foo{...} any, err := anypb.New(foo) if err != nil { ... } ... foo := &pb.Foo{} if err := any.UnmarshalTo(foo); err != nil { ... }
Protobuf 库提供的打包方法默认使用 'type.googleapis.com/full.type.name' 作为类型 URL,而解包方法只使用类型 URL 中最后一个 '/' 后面的完整限定类型名称,例如 "foo.bar.com/x/y.z" 将产生类型名称 "y.z"。
Any
值的 JSON 表示使用反序列化、嵌入消息的常规表示,并添加一个包含类型 URL 的附加字段 @type
。示例
package google.profile; message Person { string first_name = 1; string last_name = 2; }
{ "@type": "type.googleapis.com/google.profile.Person", "firstName": <string>, "lastName": <string> }
如果嵌入的消息类型是众所周知的并且具有自定义 JSON 表示,则该表示将被嵌入,除了 @type
字段外,还会添加一个包含自定义 JSON 的 value
字段。示例(对于消息 [google.protobuf.Duration][])
{ "@type": "type.googleapis.com/google.protobuf.Duration", "value": "1.212s" }
字段名称 | 必填 | 可为空 | 类型 | 描述 | 格式 |
---|---|---|---|---|---|
@type |
字符串 |
一个唯一标识序列化协议缓冲区消息类型的 URL/资源名称。此字符串必须包含至少一个“/”字符。URL 路径的最后一部分必须表示类型的完全限定名称(如 |
字段名称 | 必填 | 可为空 | 类型 | 描述 | 格式 |
---|---|---|---|---|---|
类别 |
SEARCH_UNSET, ALERTS, IMAGES, IMAGE_COMPONENTS, IMAGE_VULN_EDGE, IMAGE_COMPONENT_EDGE, POLICIES, DEPLOYMENTS, ACTIVE_COMPONENT, PODS, SECRETS, PROCESS_INDICATORS, COMPLIANCE, CLUSTERS, NAMESPACES, NODES, NODE_COMPONENTS, NODE_VULN_EDGE, NODE_COMPONENT_EDGE, NODE_COMPONENT_CVE_EDGE, COMPLIANCE_STANDARD, COMPLIANCE_CONTROL_GROUP, COMPLIANCE_CONTROL, SERVICE_ACCOUNTS, ROLES, ROLEBINDINGS, REPORT_CONFIGURATIONS, PROCESS_BASELINES, SUBJECTS, RISKS, VULNERABILITIES, CLUSTER_VULNERABILITIES, IMAGE_VULNERABILITIES, NODE_VULNERABILITIES, COMPONENT_VULN_EDGE, CLUSTER_VULN_EDGE, NETWORK_ENTITY, VULN_REQUEST, NETWORK_BASELINE, NETWORK_POLICIES, PROCESS_BASELINE_RESULTS, COMPLIANCE_METADATA, COMPLIANCE_RESULTS, COMPLIANCE_DOMAIN, CLUSTER_HEALTH, POLICY_CATEGORIES, IMAGE_INTEGRATIONS, COLLECTIONS, POLICY_CATEGORY_EDGE, PROCESS_LISTENING_ON_PORT, API_TOKEN, REPORT_METADATA, REPORT_SNAPSHOT, COMPLIANCE_INTEGRATIONS, COMPLIANCE_SCAN_CONFIG, COMPLIANCE_SCAN, COMPLIANCE_CHECK_RESULTS, BLOB, ADMINISTRATION_EVENTS, COMPLIANCE_SCAN_CONFIG_STATUS, ADMINISTRATION_USAGE, COMPLIANCE_PROFILES, COMPLIANCE_RULES, COMPLIANCE_SCAN_SETTING_BINDINGS, COMPLIANCE_SUITES, CLOUD_SOURCES, DISCOVERED_CLUSTERS, COMPLIANCE_REMEDIATIONS, COMPLIANCE_BENCHMARKS, AUTH_PROVIDERS, COMPLIANCE_REPORT_SNAPSHOT, |
||||
计数 |
字符串 |
int64 |
Next available tag: 74
枚举值 |
---|
SEARCH_UNSET |
ALERTS |
IMAGES |
IMAGE_COMPONENTS |
IMAGE_VULN_EDGE |
IMAGE_COMPONENT_EDGE |
POLICIES |
DEPLOYMENTS |
ACTIVE_COMPONENT |
PODS |
SECRETS |
PROCESS_INDICATORS |
COMPLIANCE |
CLUSTERS |
NAMESPACES |
NODES |
NODE_COMPONENTS |
NODE_VULN_EDGE |
NODE_COMPONENT_EDGE |
NODE_COMPONENT_CVE_EDGE |
COMPLIANCE_STANDARD |
COMPLIANCE_CONTROL_GROUP |
COMPLIANCE_CONTROL |
SERVICE_ACCOUNTS |
ROLES |
ROLEBINDINGS |
REPORT_CONFIGURATIONS |
PROCESS_BASELINES |
SUBJECTS |
RISKS |
VULNERABILITIES |
CLUSTER_VULNERABILITIES |
IMAGE_VULNERABILITIES |
NODE_VULNERABILITIES |
COMPONENT_VULN_EDGE |
CLUSTER_VULN_EDGE |
NETWORK_ENTITY |
VULN_REQUEST |
NETWORK_BASELINE |
NETWORK_POLICIES |
PROCESS_BASELINE_RESULTS |
COMPLIANCE_METADATA |
COMPLIANCE_RESULTS |
COMPLIANCE_DOMAIN |
CLUSTER_HEALTH |
POLICY_CATEGORIES |
IMAGE_INTEGRATIONS |
COLLECTIONS |
POLICY_CATEGORY_EDGE |
PROCESS_LISTENING_ON_PORT |
API_TOKEN |
REPORT_METADATA |
REPORT_SNAPSHOT |
COMPLIANCE_INTEGRATIONS |
COMPLIANCE_SCAN_CONFIG |
COMPLIANCE_SCAN |
COMPLIANCE_CHECK_RESULTS |
BLOB |
ADMINISTRATION_EVENTS |
COMPLIANCE_SCAN_CONFIG_STATUS |
ADMINISTRATION_USAGE |
COMPLIANCE_PROFILES |
COMPLIANCE_RULES |
COMPLIANCE_SCAN_SETTING_BINDINGS |
COMPLIANCE_SUITES |
CLOUD_SOURCES |
DISCOVERED_CLUSTERS |
COMPLIANCE_REMEDIATIONS |
COMPLIANCE_BENCHMARKS |
AUTH_PROVIDERS |
COMPLIANCE_REPORT_SNAPSHOT |
字段名称 | 必填 | 可为空 | 类型 | 描述 | 格式 |
---|---|---|---|---|---|
ID |
字符串 |
||||
名称 |
字符串 |
||||
类别 |
SEARCH_UNSET, ALERTS, IMAGES, IMAGE_COMPONENTS, IMAGE_VULN_EDGE, IMAGE_COMPONENT_EDGE, POLICIES, DEPLOYMENTS, ACTIVE_COMPONENT, PODS, SECRETS, PROCESS_INDICATORS, COMPLIANCE, CLUSTERS, NAMESPACES, NODES, NODE_COMPONENTS, NODE_VULN_EDGE, NODE_COMPONENT_EDGE, NODE_COMPONENT_CVE_EDGE, COMPLIANCE_STANDARD, COMPLIANCE_CONTROL_GROUP, COMPLIANCE_CONTROL, SERVICE_ACCOUNTS, ROLES, ROLEBINDINGS, REPORT_CONFIGURATIONS, PROCESS_BASELINES, SUBJECTS, RISKS, VULNERABILITIES, CLUSTER_VULNERABILITIES, IMAGE_VULNERABILITIES, NODE_VULNERABILITIES, COMPONENT_VULN_EDGE, CLUSTER_VULN_EDGE, NETWORK_ENTITY, VULN_REQUEST, NETWORK_BASELINE, NETWORK_POLICIES, PROCESS_BASELINE_RESULTS, COMPLIANCE_METADATA, COMPLIANCE_RESULTS, COMPLIANCE_DOMAIN, CLUSTER_HEALTH, POLICY_CATEGORIES, IMAGE_INTEGRATIONS, COLLECTIONS, POLICY_CATEGORY_EDGE, PROCESS_LISTENING_ON_PORT, API_TOKEN, REPORT_METADATA, REPORT_SNAPSHOT, COMPLIANCE_INTEGRATIONS, COMPLIANCE_SCAN_CONFIG, COMPLIANCE_SCAN, COMPLIANCE_CHECK_RESULTS, BLOB, ADMINISTRATION_EVENTS, COMPLIANCE_SCAN_CONFIG_STATUS, ADMINISTRATION_USAGE, COMPLIANCE_PROFILES, COMPLIANCE_RULES, COMPLIANCE_SCAN_SETTING_BINDINGS, COMPLIANCE_SUITES, CLOUD_SOURCES, DISCOVERED_CLUSTERS, COMPLIANCE_REMEDIATIONS, COMPLIANCE_BENCHMARKS, AUTH_PROVIDERS, COMPLIANCE_REPORT_SNAPSHOT, |
||||
字段匹配 |
|||||
分数 |
双精度浮点数 |
double |
|||
位置 |
字符串 |
位置旨在成为结果的唯一且易于理解的标识符。例如,对于部署,位置将是“$cluster_name/$namespace/$deployment_name”。它在全局搜索结果的 UI 中显示,位于每个结果名称的下方。 |