google-cloud-os_config-v1 1.3.0 → 1.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 978fa571c94c4ade9240c700df1cce2d19772c35bde6a745865006bd02c29c8d
4
- data.tar.gz: 0d4ac05f43c109ae96fb49072556c62c7080b112e2270695164e48402440588a
3
+ metadata.gz: 7e0c23bf5eec5432ef8f3c8314e5fd90842e73062a7b48f221e44a06549f7ffe
4
+ data.tar.gz: 51f70b6c1bd4f80130208bffa0fb70c01dcf80cfac13af4bdd29c94239a2fed7
5
5
  SHA512:
6
- metadata.gz: 12901f3116a8ece0afb520d778db0952688f6a7d11c405a9066cd4b915d7b0dbac429d05b29930dc3c3ffff0cd4bfc8a83efe8a962f0d76bd437c9cb6cfa4c26
7
- data.tar.gz: c497492f6c799bf366f0c815d91934e2d605aa5bab899b444978d1fb765709fafd7c4868a4940ff9644291ca2b9d51b80ac14d44ad3454f55ebb18eabaec5893
6
+ metadata.gz: 3adc2d8385b0cee1060b9cff6a0a94b3e9383f1cee1e66106ee963e07bb40e1e4e91a185dba292721784e15b733ea6e52435507c3507820cb15ae2b8a64dbe36
7
+ data.tar.gz: 6ef2d24007e5bfa1c4165bf8dcf087c61764501e0914e7d4b737ddc431b245f839c3dccf88c8566861daea86e2d777c6708b2533823b8f34dc0aa653edeeb11c
@@ -1359,8 +1359,22 @@ module Google
1359
1359
  # `ListVulnerabilityReports` that indicates where this listing
1360
1360
  # should continue from.
1361
1361
  # @param filter [::String]
1362
- # If provided, this field specifies the criteria that must be met by a
1363
- # `vulnerabilityReport` API resource to be included in the response.
1362
+ # This field supports filtering by the severity level for the vulnerability.
1363
+ # For a list of severity levels, see [Severity levels for
1364
+ # vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
1365
+ #
1366
+ # The filter field follows the rules described in the
1367
+ # [AIP-160](https://google.aip.dev/160) guidelines as follows:
1368
+ #
1369
+ # + **Filter for a specific severity type**: you can list reports that
1370
+ # contain
1371
+ # vulnerabilities that are classified as medium by specifying
1372
+ # `vulnerabilities.details.severity:MEDIUM`.
1373
+ #
1374
+ # + **Filter for a range of severities** : you can list reports that have
1375
+ # vulnerabilities that are classified as critical or high by specifying
1376
+ # `vulnerabilities.details.severity:HIGH OR
1377
+ # vulnerabilities.details.severity:CRITICAL`
1364
1378
  #
1365
1379
  # @yield [response, operation] Access the result along with the RPC operation
1366
1380
  # @yieldparam response [::Gapic::PagedEnumerable<::Google::Cloud::OsConfig::V1::VulnerabilityReport>]
@@ -1275,8 +1275,22 @@ module Google
1275
1275
  # `ListVulnerabilityReports` that indicates where this listing
1276
1276
  # should continue from.
1277
1277
  # @param filter [::String]
1278
- # If provided, this field specifies the criteria that must be met by a
1279
- # `vulnerabilityReport` API resource to be included in the response.
1278
+ # This field supports filtering by the severity level for the vulnerability.
1279
+ # For a list of severity levels, see [Severity levels for
1280
+ # vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
1281
+ #
1282
+ # The filter field follows the rules described in the
1283
+ # [AIP-160](https://google.aip.dev/160) guidelines as follows:
1284
+ #
1285
+ # + **Filter for a specific severity type**: you can list reports that
1286
+ # contain
1287
+ # vulnerabilities that are classified as medium by specifying
1288
+ # `vulnerabilities.details.severity:MEDIUM`.
1289
+ #
1290
+ # + **Filter for a range of severities** : you can list reports that have
1291
+ # vulnerabilities that are classified as critical or high by specifying
1292
+ # `vulnerabilities.details.severity:HIGH OR
1293
+ # vulnerabilities.details.severity:CRITICAL`
1280
1294
  # @yield [result, operation] Access the result along with the TransportOperation object
1281
1295
  # @yieldparam result [::Gapic::Rest::PagedEnumerable<::Google::Cloud::OsConfig::V1::VulnerabilityReport>]
1282
1296
  # @yieldparam operation [::Gapic::Rest::TransportOperation]
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module OsConfig
23
23
  module V1
24
- VERSION = "1.3.0"
24
+ VERSION = "1.4.0"
25
25
  end
26
26
  end
27
27
  end
@@ -9,7 +9,7 @@ require 'google/api/resource_pb'
9
9
  require 'google/protobuf/timestamp_pb'
10
10
 
11
11
 
12
- descriptor_data = "\n,google/cloud/osconfig/v1/vulnerability.proto\x12\x18google.cloud.osconfig.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xc3\x08\n\x13VulnerabilityReport\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12Y\n\x0fvulnerabilities\x18\x02 \x03(\x0b\x32;.google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilityB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x1a\x82\x06\n\rVulnerability\x12T\n\x07\x64\x65tails\x18\x01 \x01(\x0b\x32\x43.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details\x12(\n\x1cinstalled_inventory_item_ids\x18\x02 \x03(\tB\x02\x18\x01\x12(\n\x1c\x61vailable_inventory_item_ids\x18\x03 \x03(\tB\x02\x18\x01\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12O\n\x05items\x18\x06 \x03(\x0b\x32@.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Item\x1a\x94\x02\n\x07\x44\x65tails\x12\x0b\n\x03\x63ve\x18\x01 \x01(\t\x12\x15\n\rcvss_v2_score\x18\x02 \x01(\x02\x12\x31\n\x07\x63vss_v3\x18\x03 \x01(\x0b\x32 .google.cloud.osconfig.v1.CVSSv3\x12\x10\n\x08severity\x18\x04 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x05 \x01(\t\x12\x61\n\nreferences\x18\x06 \x03(\x0b\x32M.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details.Reference\x1a(\n\tReference\x12\x0b\n\x03url\x18\x01 \x01(\t\x12\x0e\n\x06source\x18\x02 \x01(\t\x1a}\n\x04Item\x12#\n\x1binstalled_inventory_item_id\x18\x01 \x01(\t\x12#\n\x1b\x61vailable_inventory_item_id\x18\x02 \x01(\t\x12\x15\n\rfixed_cpe_uri\x18\x03 \x01(\t\x12\x14\n\x0cupstream_fix\x18\x04 \x01(\t:\x82\x01\xea\x41\x7f\n+osconfig.googleapis.com/VulnerabilityReport\x12Pprojects/{project}/locations/{location}/instances/{instance}/vulnerabilityReport\"b\n\x1dGetVulnerabilityReportRequest\x12\x41\n\x04name\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+osconfig.googleapis.com/VulnerabilityReport\"\x91\x01\n\x1fListVulnerabilityReportsRequest\x12\x37\n\x06parent\x18\x01 \x01(\tB\'\xe0\x41\x02\xfa\x41!\n\x1f\x63ompute.googleapis.com/Instance\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12\x0e\n\x06\x66ilter\x18\x04 \x01(\t\"\x89\x01\n ListVulnerabilityReportsResponse\x12L\n\x15vulnerability_reports\x18\x01 \x03(\x0b\x32-.google.cloud.osconfig.v1.VulnerabilityReport\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"\xb5\n\n\x06\x43VSSv3\x12\x12\n\nbase_score\x18\x01 \x01(\x02\x12\x1c\n\x14\x65xploitability_score\x18\x02 \x01(\x02\x12\x14\n\x0cimpact_score\x18\x03 \x01(\x02\x12\x44\n\rattack_vector\x18\x05 \x01(\x0e\x32-.google.cloud.osconfig.v1.CVSSv3.AttackVector\x12L\n\x11\x61ttack_complexity\x18\x06 \x01(\x0e\x32\x31.google.cloud.osconfig.v1.CVSSv3.AttackComplexity\x12P\n\x13privileges_required\x18\x07 \x01(\x0e\x32\x33.google.cloud.osconfig.v1.CVSSv3.PrivilegesRequired\x12J\n\x10user_interaction\x18\x08 \x01(\x0e\x32\x30.google.cloud.osconfig.v1.CVSSv3.UserInteraction\x12\x35\n\x05scope\x18\t \x01(\x0e\x32&.google.cloud.osconfig.v1.CVSSv3.Scope\x12G\n\x16\x63onfidentiality_impact\x18\n \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x41\n\x10integrity_impact\x18\x0b \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x44\n\x13\x61vailability_impact\x18\x0c \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\"\x99\x01\n\x0c\x41ttackVector\x12\x1d\n\x19\x41TTACK_VECTOR_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_VECTOR_NETWORK\x10\x01\x12\x1a\n\x16\x41TTACK_VECTOR_ADJACENT\x10\x02\x12\x17\n\x13\x41TTACK_VECTOR_LOCAL\x10\x03\x12\x1a\n\x16\x41TTACK_VECTOR_PHYSICAL\x10\x04\"l\n\x10\x41ttackComplexity\x12!\n\x1d\x41TTACK_COMPLEXITY_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_COMPLEXITY_LOW\x10\x01\x12\x1a\n\x16\x41TTACK_COMPLEXITY_HIGH\x10\x02\"\x92\x01\n\x12PrivilegesRequired\x12#\n\x1fPRIVILEGES_REQUIRED_UNSPECIFIED\x10\x00\x12\x1c\n\x18PRIVILEGES_REQUIRED_NONE\x10\x01\x12\x1b\n\x17PRIVILEGES_REQUIRED_LOW\x10\x02\x12\x1c\n\x18PRIVILEGES_REQUIRED_HIGH\x10\x03\"m\n\x0fUserInteraction\x12 \n\x1cUSER_INTERACTION_UNSPECIFIED\x10\x00\x12\x19\n\x15USER_INTERACTION_NONE\x10\x01\x12\x1d\n\x19USER_INTERACTION_REQUIRED\x10\x02\"F\n\x05Scope\x12\x15\n\x11SCOPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fSCOPE_UNCHANGED\x10\x01\x12\x11\n\rSCOPE_CHANGED\x10\x02\"R\n\x06Impact\x12\x16\n\x12IMPACT_UNSPECIFIED\x10\x00\x12\x0f\n\x0bIMPACT_HIGH\x10\x01\x12\x0e\n\nIMPACT_LOW\x10\x02\x12\x0f\n\x0bIMPACT_NONE\x10\x03\x42\xc2\x01\n\x1c\x63om.google.cloud.osconfig.v1B\x12VulnerabilityProtoP\x01Z8cloud.google.com/go/osconfig/apiv1/osconfigpb;osconfigpb\xaa\x02\x18Google.Cloud.OsConfig.V1\xca\x02\x18Google\\Cloud\\OsConfig\\V1\xea\x02\x1bGoogle::Cloud::OsConfig::V1b\x06proto3"
12
+ descriptor_data = "\n,google/cloud/osconfig/v1/vulnerability.proto\x12\x18google.cloud.osconfig.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xcc\n\n\x13VulnerabilityReport\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12Y\n\x0fvulnerabilities\x18\x02 \x03(\x0b\x32;.google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilityB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12v\n\x1fhighest_upgradable_cve_severity\x18\x04 \x01(\x0e\x32H.google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilitySeverityLevelB\x03\xe0\x41\x03\x1a\x82\x06\n\rVulnerability\x12T\n\x07\x64\x65tails\x18\x01 \x01(\x0b\x32\x43.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details\x12(\n\x1cinstalled_inventory_item_ids\x18\x02 \x03(\tB\x02\x18\x01\x12(\n\x1c\x61vailable_inventory_item_ids\x18\x03 \x03(\tB\x02\x18\x01\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12O\n\x05items\x18\x06 \x03(\x0b\x32@.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Item\x1a\x94\x02\n\x07\x44\x65tails\x12\x0b\n\x03\x63ve\x18\x01 \x01(\t\x12\x15\n\rcvss_v2_score\x18\x02 \x01(\x02\x12\x31\n\x07\x63vss_v3\x18\x03 \x01(\x0b\x32 .google.cloud.osconfig.v1.CVSSv3\x12\x10\n\x08severity\x18\x04 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x05 \x01(\t\x12\x61\n\nreferences\x18\x06 \x03(\x0b\x32M.google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details.Reference\x1a(\n\tReference\x12\x0b\n\x03url\x18\x01 \x01(\t\x12\x0e\n\x06source\x18\x02 \x01(\t\x1a}\n\x04Item\x12#\n\x1binstalled_inventory_item_id\x18\x01 \x01(\t\x12#\n\x1b\x61vailable_inventory_item_id\x18\x02 \x01(\t\x12\x15\n\rfixed_cpe_uri\x18\x03 \x01(\t\x12\x14\n\x0cupstream_fix\x18\x04 \x01(\t\"\x8e\x01\n\x1aVulnerabilitySeverityLevel\x12,\n(VULNERABILITY_SEVERITY_LEVEL_UNSPECIFIED\x10\x00\x12\x08\n\x04NONE\x10\x01\x12\x0b\n\x07MINIMAL\x10\x02\x12\x07\n\x03LOW\x10\x03\x12\n\n\x06MEDIUM\x10\x04\x12\x08\n\x04HIGH\x10\x05\x12\x0c\n\x08\x43RITICAL\x10\x06:\x82\x01\xea\x41\x7f\n+osconfig.googleapis.com/VulnerabilityReport\x12Pprojects/{project}/locations/{location}/instances/{instance}/vulnerabilityReport\"b\n\x1dGetVulnerabilityReportRequest\x12\x41\n\x04name\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+osconfig.googleapis.com/VulnerabilityReport\"\x91\x01\n\x1fListVulnerabilityReportsRequest\x12\x37\n\x06parent\x18\x01 \x01(\tB\'\xe0\x41\x02\xfa\x41!\n\x1f\x63ompute.googleapis.com/Instance\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12\x0e\n\x06\x66ilter\x18\x04 \x01(\t\"\x89\x01\n ListVulnerabilityReportsResponse\x12L\n\x15vulnerability_reports\x18\x01 \x03(\x0b\x32-.google.cloud.osconfig.v1.VulnerabilityReport\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"\xb5\n\n\x06\x43VSSv3\x12\x12\n\nbase_score\x18\x01 \x01(\x02\x12\x1c\n\x14\x65xploitability_score\x18\x02 \x01(\x02\x12\x14\n\x0cimpact_score\x18\x03 \x01(\x02\x12\x44\n\rattack_vector\x18\x05 \x01(\x0e\x32-.google.cloud.osconfig.v1.CVSSv3.AttackVector\x12L\n\x11\x61ttack_complexity\x18\x06 \x01(\x0e\x32\x31.google.cloud.osconfig.v1.CVSSv3.AttackComplexity\x12P\n\x13privileges_required\x18\x07 \x01(\x0e\x32\x33.google.cloud.osconfig.v1.CVSSv3.PrivilegesRequired\x12J\n\x10user_interaction\x18\x08 \x01(\x0e\x32\x30.google.cloud.osconfig.v1.CVSSv3.UserInteraction\x12\x35\n\x05scope\x18\t \x01(\x0e\x32&.google.cloud.osconfig.v1.CVSSv3.Scope\x12G\n\x16\x63onfidentiality_impact\x18\n \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x41\n\x10integrity_impact\x18\x0b \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\x12\x44\n\x13\x61vailability_impact\x18\x0c \x01(\x0e\x32\'.google.cloud.osconfig.v1.CVSSv3.Impact\"\x99\x01\n\x0c\x41ttackVector\x12\x1d\n\x19\x41TTACK_VECTOR_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_VECTOR_NETWORK\x10\x01\x12\x1a\n\x16\x41TTACK_VECTOR_ADJACENT\x10\x02\x12\x17\n\x13\x41TTACK_VECTOR_LOCAL\x10\x03\x12\x1a\n\x16\x41TTACK_VECTOR_PHYSICAL\x10\x04\"l\n\x10\x41ttackComplexity\x12!\n\x1d\x41TTACK_COMPLEXITY_UNSPECIFIED\x10\x00\x12\x19\n\x15\x41TTACK_COMPLEXITY_LOW\x10\x01\x12\x1a\n\x16\x41TTACK_COMPLEXITY_HIGH\x10\x02\"\x92\x01\n\x12PrivilegesRequired\x12#\n\x1fPRIVILEGES_REQUIRED_UNSPECIFIED\x10\x00\x12\x1c\n\x18PRIVILEGES_REQUIRED_NONE\x10\x01\x12\x1b\n\x17PRIVILEGES_REQUIRED_LOW\x10\x02\x12\x1c\n\x18PRIVILEGES_REQUIRED_HIGH\x10\x03\"m\n\x0fUserInteraction\x12 \n\x1cUSER_INTERACTION_UNSPECIFIED\x10\x00\x12\x19\n\x15USER_INTERACTION_NONE\x10\x01\x12\x1d\n\x19USER_INTERACTION_REQUIRED\x10\x02\"F\n\x05Scope\x12\x15\n\x11SCOPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fSCOPE_UNCHANGED\x10\x01\x12\x11\n\rSCOPE_CHANGED\x10\x02\"R\n\x06Impact\x12\x16\n\x12IMPACT_UNSPECIFIED\x10\x00\x12\x0f\n\x0bIMPACT_HIGH\x10\x01\x12\x0e\n\nIMPACT_LOW\x10\x02\x12\x0f\n\x0bIMPACT_NONE\x10\x03\x42\xc2\x01\n\x1c\x63om.google.cloud.osconfig.v1B\x12VulnerabilityProtoP\x01Z8cloud.google.com/go/osconfig/apiv1/osconfigpb;osconfigpb\xaa\x02\x18Google.Cloud.OsConfig.V1\xca\x02\x18Google\\Cloud\\OsConfig\\V1\xea\x02\x1bGoogle::Cloud::OsConfig::V1b\x06proto3"
13
13
 
14
14
  pool = Google::Protobuf::DescriptorPool.generated_pool
15
15
 
@@ -45,6 +45,7 @@ module Google
45
45
  VulnerabilityReport::Vulnerability::Details = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details").msgclass
46
46
  VulnerabilityReport::Vulnerability::Details::Reference = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Details.Reference").msgclass
47
47
  VulnerabilityReport::Vulnerability::Item = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.Vulnerability.Item").msgclass
48
+ VulnerabilityReport::VulnerabilitySeverityLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.VulnerabilityReport.VulnerabilitySeverityLevel").enummodule
48
49
  GetVulnerabilityReportRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.GetVulnerabilityReportRequest").msgclass
49
50
  ListVulnerabilityReportsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.ListVulnerabilityReportsRequest").msgclass
50
51
  ListVulnerabilityReportsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.osconfig.v1.ListVulnerabilityReportsResponse").msgclass
@@ -37,8 +37,12 @@ module Google
37
37
  # Output only. List of vulnerabilities affecting the VM.
38
38
  # @!attribute [r] update_time
39
39
  # @return [::Google::Protobuf::Timestamp]
40
- # Output only. The timestamp for when the last vulnerability report was generated for the
41
- # VM.
40
+ # Output only. The timestamp for when the last vulnerability report was
41
+ # generated for the VM.
42
+ # @!attribute [r] highest_upgradable_cve_severity
43
+ # @return [::Google::Cloud::OsConfig::V1::VulnerabilityReport::VulnerabilitySeverityLevel]
44
+ # Output only. Highest level of severity among all the upgradable
45
+ # vulnerabilities with CVEs attached.
42
46
  class VulnerabilityReport
43
47
  include ::Google::Protobuf::MessageExts
44
48
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -147,6 +151,35 @@ module Google
147
151
  extend ::Google::Protobuf::MessageExts::ClassMethods
148
152
  end
149
153
  end
154
+
155
+ # Severity levels for vulnerabilities.
156
+ module VulnerabilitySeverityLevel
157
+ # Default SeverityLevel. This value is unused.
158
+ VULNERABILITY_SEVERITY_LEVEL_UNSPECIFIED = 0
159
+
160
+ # Vulnerability has no severity level.
161
+ NONE = 1
162
+
163
+ # Vulnerability severity level is minimal. This is level below the low
164
+ # severity level.
165
+ MINIMAL = 2
166
+
167
+ # Vulnerability severity level is low. This is level below the medium
168
+ # severity level.
169
+ LOW = 3
170
+
171
+ # Vulnerability severity level is medium. This is level below the high
172
+ # severity level.
173
+ MEDIUM = 4
174
+
175
+ # Vulnerability severity level is high. This is level below the critical
176
+ # severity level.
177
+ HIGH = 5
178
+
179
+ # Vulnerability severity level is critical. This is the highest severity
180
+ # level.
181
+ CRITICAL = 6
182
+ end
150
183
  end
151
184
 
152
185
  # A request message for getting the vulnerability report for the specified VM.
@@ -184,8 +217,22 @@ module Google
184
217
  # should continue from.
185
218
  # @!attribute [rw] filter
186
219
  # @return [::String]
187
- # If provided, this field specifies the criteria that must be met by a
188
- # `vulnerabilityReport` API resource to be included in the response.
220
+ # This field supports filtering by the severity level for the vulnerability.
221
+ # For a list of severity levels, see [Severity levels for
222
+ # vulnerabilities](https://cloud.google.com/container-analysis/docs/container-scanning-overview#severity_levels_for_vulnerabilities).
223
+ #
224
+ # The filter field follows the rules described in the
225
+ # [AIP-160](https://google.aip.dev/160) guidelines as follows:
226
+ #
227
+ # + **Filter for a specific severity type**: you can list reports that
228
+ # contain
229
+ # vulnerabilities that are classified as medium by specifying
230
+ # `vulnerabilities.details.severity:MEDIUM`.
231
+ #
232
+ # + **Filter for a range of severities** : you can list reports that have
233
+ # vulnerabilities that are classified as critical or high by specifying
234
+ # `vulnerabilities.details.severity:HIGH OR
235
+ # vulnerabilities.details.severity:CRITICAL`
189
236
  class ListVulnerabilityReportsRequest
190
237
  include ::Google::Protobuf::MessageExts
191
238
  extend ::Google::Protobuf::MessageExts::ClassMethods
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-os_config-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.3.0
4
+ version: 1.4.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
@@ -125,7 +125,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
125
125
  - !ruby/object:Gem::Version
126
126
  version: '0'
127
127
  requirements: []
128
- rubygems_version: 3.6.8
128
+ rubygems_version: 3.6.9
129
129
  specification_version: 4
130
130
  summary: OS management tools that can be used for patch management, patch compliance,
131
131
  and configuration management on VM instances.