DS - Dependency Manifest Scanning
#### Overview
This epic is for tracking the manifest parsing and scanning work for Java and Python required to reach the [General Availability (GA) level](https://docs.gitlab.com/ee/policy/experiment-beta-support.html#generally-available-ga) for [Dependency Scanning by using SBOM](https://docs.gitlab.com/user/application_security/dependency_scanning/dependency_scanning_sbom/) currently released as Limited Availability. See linked items for additional context.
#### Problem to Solve
The current workflow requires users to generate lock _(Python)_ or graph _(Java)_ files and store them in their repository to be picked up for dependency scanning. When a lock or graph file the DS Analyzer will not successfully scan a project and provide users with their vulnerable dependencies. This creates friction for users when adopting DS Analyzer as not all users generate lock/graph files and users require insight into potentially vulnerable dependencies in their projects..
Implementing manifest scanning will allow users to resolve and scan direct dependencies when a lock or graph file is not present for Java or Python projects.
#### Scope
* https://gitlab.com/gitlab-org/gitlab/-/issues/586921+
* https://gitlab.com/gitlab-org/gitlab/-/issues/585886+
* https://gitlab.com/gitlab-org/gitlab/-/issues/588788+
####
epic