google-cloud-os_config-v1 1.2.1 → 1.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/os_config/v1/os_config_zonal_service/client.rb +16 -2
- data/lib/google/cloud/os_config/v1/os_config_zonal_service/rest/client.rb +16 -2
- data/lib/google/cloud/os_config/v1/version.rb +1 -1
- data/lib/google/cloud/osconfig/v1/vulnerability_pb.rb +2 -1
- data/proto_docs/google/cloud/osconfig/v1/vulnerability.rb +51 -4
- metadata +7 -13
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 7e0c23bf5eec5432ef8f3c8314e5fd90842e73062a7b48f221e44a06549f7ffe
|
4
|
+
data.tar.gz: 51f70b6c1bd4f80130208bffa0fb70c01dcf80cfac13af4bdd29c94239a2fed7
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 3adc2d8385b0cee1060b9cff6a0a94b3e9383f1cee1e66106ee963e07bb40e1e4e91a185dba292721784e15b733ea6e52435507c3507820cb15ae2b8a64dbe36
|
7
|
+
data.tar.gz: 6ef2d24007e5bfa1c4165bf8dcf087c61764501e0914e7d4b737ddc431b245f839c3dccf88c8566861daea86e2d777c6708b2533823b8f34dc0aa653edeeb11c
|
@@ -1359,8 +1359,22 @@ module Google
|
|
1359
1359
|
# `ListVulnerabilityReports` that indicates where this listing
|
1360
1360
|
# should continue from.
|
1361
1361
|
# @param filter [::String]
|
1362
|
-
#
|
1363
|
-
#
|
1362
|
+
# This field supports filtering by the severity level for the vulnerability.
|
1363
|
+
# For a list of severity levels, see [Severity levels for
|
1364
|
+
# vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
|
1365
|
+
#
|
1366
|
+
# The filter field follows the rules described in the
|
1367
|
+
# [AIP-160](https://google.aip.dev/160) guidelines as follows:
|
1368
|
+
#
|
1369
|
+
# + **Filter for a specific severity type**: you can list reports that
|
1370
|
+
# contain
|
1371
|
+
# vulnerabilities that are classified as medium by specifying
|
1372
|
+
# `vulnerabilities.details.severity:MEDIUM`.
|
1373
|
+
#
|
1374
|
+
# + **Filter for a range of severities** : you can list reports that have
|
1375
|
+
# vulnerabilities that are classified as critical or high by specifying
|
1376
|
+
# `vulnerabilities.details.severity:HIGH OR
|
1377
|
+
# vulnerabilities.details.severity:CRITICAL`
|
1364
1378
|
#
|
1365
1379
|
# @yield [response, operation] Access the result along with the RPC operation
|
1366
1380
|
# @yieldparam response [::Gapic::PagedEnumerable<::Google::Cloud::OsConfig::V1::VulnerabilityReport>]
|
@@ -1275,8 +1275,22 @@ module Google
|
|
1275
1275
|
# `ListVulnerabilityReports` that indicates where this listing
|
1276
1276
|
# should continue from.
|
1277
1277
|
# @param filter [::String]
|
1278
|
-
#
|
1279
|
-
#
|
1278
|
+
# This field supports filtering by the severity level for the vulnerability.
|
1279
|
+
# For a list of severity levels, see [Severity levels for
|
1280
|
+
# vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
|
1281
|
+
#
|
1282
|
+
# The filter field follows the rules described in the
|
1283
|
+
# [AIP-160](https://google.aip.dev/160) guidelines as follows:
|
1284
|
+
#
|
1285
|
+
# + **Filter for a specific severity type**: you can list reports that
|
1286
|
+
# contain
|
1287
|
+
# vulnerabilities that are classified as medium by specifying
|
1288
|
+
# `vulnerabilities.details.severity:MEDIUM`.
|
1289
|
+
#
|
1290
|
+
# + **Filter for a range of severities** : you can list reports that have
|
1291
|
+
# vulnerabilities that are classified as critical or high by specifying
|
1292
|
+
# `vulnerabilities.details.severity:HIGH OR
|
1293
|
+
# vulnerabilities.details.severity:CRITICAL`
|
1280
1294
|
# @yield [result, operation] Access the result along with the TransportOperation object
|
1281
1295
|
# @yieldparam result [::Gapic::Rest::PagedEnumerable<::Google::Cloud::OsConfig::V1::VulnerabilityReport>]
|
1282
1296
|
# @yieldparam operation [::Gapic::Rest::TransportOperation]
|
@@ -9,7 +9,7 @@ require 'google/api/resource_pb'
|
|
9
9
|
require 'google/protobuf/timestamp_pb'
|
10
10
|
|
11
11
|
|
12
|
-
descriptor_data = "\n,google/cloud/osconfig/v1/vulnerability.proto\x12\x18google.cloud.osconfig.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\
|
12
|
+
descriptor_data = "\n,google/cloud/osconfig/v1/vulnerability.proto\x12\x18google.cloud.osconfig.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xcc\n\n\x13VulnerabilityReport\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12Y\n\x0fvulnerabilities\x18\x02 \x03(\x0b\x32;.google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilityB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12v\n\x1fhighest_upgradable_cve_severity\x18\x04 \x01(\x0e\x32H.google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilitySeverityLevelB\x03\xe0\x41\x03\x1a\x82\x06\n\rVulnerability\x12T\n\x07\x64\x65tails\x18\x01 \x01(\x0b\x32\x43.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details\x12(\n\x1cinstalled_inventory_item_ids\x18\x02 \x03(\tB\x02\x18\x01\x12(\n\x1c\x61vailable_inventory_item_ids\x18\x03 \x03(\tB\x02\x18\x01\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12O\n\x05items\x18\x06 \x03(\x0b\x32@.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Item\x1a\x94\x02\n\x07\x44\x65tails\x12\x0b\n\x03\x63ve\x18\x01 \x01(\t\x12\x15\n\rcvss_v2_score\x18\x02 \x01(\x02\x12\x31\n\x07\x63vss_v3\x18\x03 \x01(\x0b\x32 .google.cloud.osconfig.v1.CVSSv3\x12\x10\n\x08severity\x18\x04 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x05 \x01(\t\x12\x61\n\nreferences\x18\x06 \x03(\x0b\x32M.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details.Reference\x1a(\n\tReference\x12\x0b\n\x03url\x18\x01 \x01(\t\x12\x0e\n\x06source\x18\x02 \x01(\t\x1a}\n\x04Item\x12#\n\x1binstalled_inventory_item_id\x18\x01 \x01(\t\x12#\n\x1b\x61vailable_inventory_item_id\x18\x02 \x01(\t\x12\x15\n\rfixed_cpe_uri\x18\x03 \x01(\t\x12\x14\n\x0cupstream_fix\x18\x04 \x01(\t\"\x8e\x01\n\x1aVulnerabilitySeverityLevel\x12,\n(VULNERABILITY_SEVERITY_LEVEL_UNSPECIFIED\x10\x00\x12\x08\n\x04NONE\x10\x01\x12\x0b\n\x07MINIMAL\x10\x02\x12\x07\n\x03LOW\x10\x03\x12\n\n\x06MEDIUM\x10\x04\x12\x08\n\x04HIGH\x10\x05\x12\x0c\n\x08\x43RITICAL\x10\x06:\x82\x01\xea\x41\x7f\n+osconfig.googleapis.com/VulnerabilityReport\x12Pprojects/{project}/locations/{location}/instances/{instance}/vulnerabilityReport\"b\n\x1dGetVulnerabilityReportRequest\x12\x41\n\x04name\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+osconfig.googleapis.com/VulnerabilityReport\"\x91\x01\n\x1fListVulnerabilityReportsRequest\x12\x37\n\x06parent\x18\x01 \x01(\tB\'\xe0\x41\x02\xfa\x41!\n\x1f\x63ompute.googleapis.com/Instance\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12\x0e\n\x06\x66ilter\x18\x04 \x01(\t\"\x89\x01\n ListVulnerabilityReportsResponse\x12L\n\x15vulnerability_reports\x18\x01 \x03(\x0b\x32-.google.cloud.osconfig.v1.VulnerabilityReport\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"\xb5\n\n\x06\x43VSSv3\x12\x12\n\nbase_score\x18\x01 \x01(\x02\x12\x1c\n\x14\x65xploitability_score\x18\x02 \x01(\x02\x12\x14\n\x0cimpact_score\x18\x03 \x01(\x02\x12\x44\n\rattack_vector\x18\x05 \x01(\x0e\x32-.google.cloud.osconfig.v1.CVSSv3.AttackVector\x12L\n\x11\x61ttack_complexity\x18\x06 \x01(\x0e\x32\x31.google.cloud.osconfig.v1.CVSSv3.AttackComplexity\x12P\n\x13privileges_required\x18\x07 \x01(\x0e\x32\x33.google.cloud.osconfig.v1.CVSSv3.PrivilegesRequired\x12J\n\x10user_interaction\x18\x08 \x01(\x0e\x32\x30.google.cloud.osconfig.v1.CVSSv3.UserInteraction\x12\x35\n\x05scope\x18\t \x01(\x0e\x32&.google.cloud.osconfig.v1.CVSSv3.Scope\x12G\n\x16\x63onfidentiality_impact\x18\n \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x41\n\x10integrity_impact\x18\x0b \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x44\n\x13\x61vailability_impact\x18\x0c \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\"\x99\x01\n\x0c\x41ttackVector\x12\x1d\n\x19\x41TTACK_VECTOR_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_VECTOR_NETWORK\x10\x01\x12\x1a\n\x16\x41TTACK_VECTOR_ADJACENT\x10\x02\x12\x17\n\x13\x41TTACK_VECTOR_LOCAL\x10\x03\x12\x1a\n\x16\x41TTACK_VECTOR_PHYSICAL\x10\x04\"l\n\x10\x41ttackComplexity\x12!\n\x1d\x41TTACK_COMPLEXITY_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_COMPLEXITY_LOW\x10\x01\x12\x1a\n\x16\x41TTACK_COMPLEXITY_HIGH\x10\x02\"\x92\x01\n\x12PrivilegesRequired\x12#\n\x1fPRIVILEGES_REQUIRED_UNSPECIFIED\x10\x00\x12\x1c\n\x18PRIVILEGES_REQUIRED_NONE\x10\x01\x12\x1b\n\x17PRIVILEGES_REQUIRED_LOW\x10\x02\x12\x1c\n\x18PRIVILEGES_REQUIRED_HIGH\x10\x03\"m\n\x0fUserInteraction\x12 \n\x1cUSER_INTERACTION_UNSPECIFIED\x10\x00\x12\x19\n\x15USER_INTERACTION_NONE\x10\x01\x12\x1d\n\x19USER_INTERACTION_REQUIRED\x10\x02\"F\n\x05Scope\x12\x15\n\x11SCOPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fSCOPE_UNCHANGED\x10\x01\x12\x11\n\rSCOPE_CHANGED\x10\x02\"R\n\x06Impact\x12\x16\n\x12IMPACT_UNSPECIFIED\x10\x00\x12\x0f\n\x0bIMPACT_HIGH\x10\x01\x12\x0e\n\nIMPACT_LOW\x10\x02\x12\x0f\n\x0bIMPACT_NONE\x10\x03\x42\xc2\x01\n\x1c\x63om.google.cloud.osconfig.v1B\x12VulnerabilityProtoP\x01Z8cloud.google.com/go/osconfig/apiv1/osconfigpb;osconfigpb\xaa\x02\x18Google.Cloud.OsConfig.V1\xca\x02\x18Google\\Cloud\\OsConfig\\V1\xea\x02\x1bGoogle::Cloud::OsConfig::V1b\x06proto3"
|
13
13
|
|
14
14
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
15
15
|
|
@@ -45,6 +45,7 @@ module Google
|
|
45
45
|
VulnerabilityReport::Vulnerability::Details = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details").msgclass
|
46
46
|
VulnerabilityReport::Vulnerability::Details::Reference = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details.Reference").msgclass
|
47
47
|
VulnerabilityReport::Vulnerability::Item = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Item").msgclass
|
48
|
+
VulnerabilityReport::VulnerabilitySeverityLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilitySeverityLevel").enummodule
|
48
49
|
GetVulnerabilityReportRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.GetVulnerabilityReportRequest").msgclass
|
49
50
|
ListVulnerabilityReportsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.ListVulnerabilityReportsRequest").msgclass
|
50
51
|
ListVulnerabilityReportsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.ListVulnerabilityReportsResponse").msgclass
|
@@ -37,8 +37,12 @@ module Google
|
|
37
37
|
# Output only. List of vulnerabilities affecting the VM.
|
38
38
|
# @!attribute [r] update_time
|
39
39
|
# @return [::Google::Protobuf::Timestamp]
|
40
|
-
# Output only. The timestamp for when the last vulnerability report was
|
41
|
-
# VM.
|
40
|
+
# Output only. The timestamp for when the last vulnerability report was
|
41
|
+
# generated for the VM.
|
42
|
+
# @!attribute [r] highest_upgradable_cve_severity
|
43
|
+
# @return [::Google::Cloud::OsConfig::V1::VulnerabilityReport::VulnerabilitySeverityLevel]
|
44
|
+
# Output only. Highest level of severity among all the upgradable
|
45
|
+
# vulnerabilities with CVEs attached.
|
42
46
|
class VulnerabilityReport
|
43
47
|
include ::Google::Protobuf::MessageExts
|
44
48
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -147,6 +151,35 @@ module Google
|
|
147
151
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
148
152
|
end
|
149
153
|
end
|
154
|
+
|
155
|
+
# Severity levels for vulnerabilities.
|
156
|
+
module VulnerabilitySeverityLevel
|
157
|
+
# Default SeverityLevel. This value is unused.
|
158
|
+
VULNERABILITY_SEVERITY_LEVEL_UNSPECIFIED = 0
|
159
|
+
|
160
|
+
# Vulnerability has no severity level.
|
161
|
+
NONE = 1
|
162
|
+
|
163
|
+
# Vulnerability severity level is minimal. This is level below the low
|
164
|
+
# severity level.
|
165
|
+
MINIMAL = 2
|
166
|
+
|
167
|
+
# Vulnerability severity level is low. This is level below the medium
|
168
|
+
# severity level.
|
169
|
+
LOW = 3
|
170
|
+
|
171
|
+
# Vulnerability severity level is medium. This is level below the high
|
172
|
+
# severity level.
|
173
|
+
MEDIUM = 4
|
174
|
+
|
175
|
+
# Vulnerability severity level is high. This is level below the critical
|
176
|
+
# severity level.
|
177
|
+
HIGH = 5
|
178
|
+
|
179
|
+
# Vulnerability severity level is critical. This is the highest severity
|
180
|
+
# level.
|
181
|
+
CRITICAL = 6
|
182
|
+
end
|
150
183
|
end
|
151
184
|
|
152
185
|
# A request message for getting the vulnerability report for the specified VM.
|
@@ -184,8 +217,22 @@ module Google
|
|
184
217
|
# should continue from.
|
185
218
|
# @!attribute [rw] filter
|
186
219
|
# @return [::String]
|
187
|
-
#
|
188
|
-
#
|
220
|
+
# This field supports filtering by the severity level for the vulnerability.
|
221
|
+
# For a list of severity levels, see [Severity levels for
|
222
|
+
# vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
|
223
|
+
#
|
224
|
+
# The filter field follows the rules described in the
|
225
|
+
# [AIP-160](https://google.aip.dev/160) guidelines as follows:
|
226
|
+
#
|
227
|
+
# + **Filter for a specific severity type**: you can list reports that
|
228
|
+
# contain
|
229
|
+
# vulnerabilities that are classified as medium by specifying
|
230
|
+
# `vulnerabilities.details.severity:MEDIUM`.
|
231
|
+
#
|
232
|
+
# + **Filter for a range of severities** : you can list reports that have
|
233
|
+
# vulnerabilities that are classified as critical or high by specifying
|
234
|
+
# `vulnerabilities.details.severity:HIGH OR
|
235
|
+
# vulnerabilities.details.severity:CRITICAL`
|
189
236
|
class ListVulnerabilityReportsRequest
|
190
237
|
include ::Google::Protobuf::MessageExts
|
191
238
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-os_config-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
@@ -13,22 +13,16 @@ dependencies:
|
|
13
13
|
name: gapic-common
|
14
14
|
requirement: !ruby/object:Gem::Requirement
|
15
15
|
requirements:
|
16
|
-
- - "
|
17
|
-
- !ruby/object:Gem::Version
|
18
|
-
version: 0.25.0
|
19
|
-
- - "<"
|
16
|
+
- - "~>"
|
20
17
|
- !ruby/object:Gem::Version
|
21
|
-
version:
|
18
|
+
version: '1.0'
|
22
19
|
type: :runtime
|
23
20
|
prerelease: false
|
24
21
|
version_requirements: !ruby/object:Gem::Requirement
|
25
22
|
requirements:
|
26
|
-
- - "
|
27
|
-
- !ruby/object:Gem::Version
|
28
|
-
version: 0.25.0
|
29
|
-
- - "<"
|
23
|
+
- - "~>"
|
30
24
|
- !ruby/object:Gem::Version
|
31
|
-
version:
|
25
|
+
version: '1.0'
|
32
26
|
- !ruby/object:Gem::Dependency
|
33
27
|
name: google-cloud-errors
|
34
28
|
requirement: !ruby/object:Gem::Requirement
|
@@ -124,14 +118,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
124
118
|
requirements:
|
125
119
|
- - ">="
|
126
120
|
- !ruby/object:Gem::Version
|
127
|
-
version: '3.
|
121
|
+
version: '3.1'
|
128
122
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
129
123
|
requirements:
|
130
124
|
- - ">="
|
131
125
|
- !ruby/object:Gem::Version
|
132
126
|
version: '0'
|
133
127
|
requirements: []
|
134
|
-
rubygems_version: 3.6.
|
128
|
+
rubygems_version: 3.6.9
|
135
129
|
specification_version: 4
|
136
130
|
summary: OS management tools that can be used for patch management, patch compliance,
|
137
131
|
and configuration management on VM instances.
|