- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`ancestors
Type: UNORDERED_LIST_STRING
description
Type: STRING
Provider name: description
Description: Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
etag
Type: STRING
Provider name: etag
Description: Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
labels
Type: UNORDERED_LIST_STRING
name
Type: STRING
Provider name: name
Description: Required. The resource name, in the format: projects/*/attestors/*
. This field may not be updated.
organization_id
Type: STRING
parent
Type: STRING
project_id
Type: STRING
project_number
Type: STRING
resource_name
Type: STRING
tags
Type: UNORDERED_LIST_STRING
update_time
Type: TIMESTAMP
Provider name: updateTime
Description: Output only. Time when the attestor was last updated.
user_owned_grafeas_note
Type: STRUCT
Provider name: userOwnedGrafeasNote
Description: This specifies how an attestation will be read, and how it will be used during policy enforcement.
delegation_service_account_email
STRING
delegationServiceAccountEmail
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern.note_reference
STRING
noteReference
projects/[PROJECT_ID]/notes/*
. This field may not be updated. A project ID must be used, not a project number. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency.public_keys
UNORDERED_LIST_STRUCT
publicKeys
ascii_armored_pgp_public_key
STRING
asciiArmoredPgpPublicKey
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field, id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. If id
is provided by the caller, it will be overwritten by the API-calculated ID.comment
STRING
comment
id
STRING
id
public_key
cases below for details.pkix_public_key
STRUCT
pkixPublicKey
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. If id
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.key_id
STRING
keyId
key_id
field exactly. The ID may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_id
is left blank and this PkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If this PkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g. AttestorPublicKey
), then this field can either match that value exactly, or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.public_key_pem
STRING
publicKeyPem
signature_algorithm
STRING
signatureAlgorithm
public_key_pem
(i.e. this algorithm must match that of the public key).SIGNATURE_ALGORITHM_UNSPECIFIED
- Not specified.RSA_PSS_2048_SHA256
- RSASSA-PSS 2048 bit key with a SHA256 digest.RSA_SIGN_PSS_2048_SHA256
- RSASSA-PSS 2048 bit key with a SHA256 digest.RSA_PSS_3072_SHA256
- RSASSA-PSS 3072 bit key with a SHA256 digest.RSA_SIGN_PSS_3072_SHA256
- RSASSA-PSS 3072 bit key with a SHA256 digest.RSA_PSS_4096_SHA256
- RSASSA-PSS 4096 bit key with a SHA256 digest.RSA_SIGN_PSS_4096_SHA256
- RSASSA-PSS 4096 bit key with a SHA256 digest.RSA_PSS_4096_SHA512
- RSASSA-PSS 4096 bit key with a SHA512 digest.RSA_SIGN_PSS_4096_SHA512
- RSASSA-PSS 4096 bit key with a SHA512 digest.RSA_SIGN_PKCS1_2048_SHA256
- RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.RSA_SIGN_PKCS1_3072_SHA256
- RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.RSA_SIGN_PKCS1_4096_SHA256
- RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.RSA_SIGN_PKCS1_4096_SHA512
- RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.ECDSA_P256_SHA256
- ECDSA on the NIST P-256 curve with a SHA256 digest.EC_SIGN_P256_SHA256
- ECDSA on the NIST P-256 curve with a SHA256 digest.ECDSA_P384_SHA384
- ECDSA on the NIST P-384 curve with a SHA384 digest.EC_SIGN_P384_SHA384
- ECDSA on the NIST P-384 curve with a SHA384 digest.ECDSA_P521_SHA512
- ECDSA on the NIST P-521 curve with a SHA512 digest.EC_SIGN_P521_SHA512
- ECDSA on the NIST P-521 curve with a SHA512 digest.