Skip to content
Permalink
Browse files
feat: Update OSConfig API (#399)
* feat: Update OSConfig API

PiperOrigin-RevId: 409204961

Source-Link: googleapis/googleapis@a85beae

Source-Link: https://github.com/googleapis/googleapis-gen/commit/b334c5d7b45f4af1133af971789048299b66dc39
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiYjMzNGM1ZDdiNDVmNGFmMTEzM2FmOTcxNzg5MDQ4Mjk5YjY2ZGMzOSJ9

* 🦉 Updates from OwlBot

See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md

Co-authored-by: Owl Bot <gcf-owl-bot[bot]@users.noreply.github.com>
  • Loading branch information
gcf-owl-bot[bot] and gcf-owl-bot[bot] committed Nov 17, 2021
1 parent 9d89d23 commit 1b4b54232ea638131a04134f921e85b160262f8b
@@ -43,6 +43,10 @@ public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry r
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Details_Reference_descriptor;
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Details_Reference_fieldAccessorTable;
static final com.google.protobuf.Descriptors.Descriptor
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Item_descriptor;
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Item_fieldAccessorTable;
static final com.google.protobuf.Descriptors.Descriptor
internal_static_google_cloud_osconfig_v1_GetVulnerabilityReportRequest_descriptor;
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
@@ -72,77 +76,82 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ ".proto\022\030google.cloud.osconfig.v1\032\037google"
+ "/api/field_behavior.proto\032\031google/api/re"
+ "source.proto\032\037google/protobuf/timestamp."
+ "proto\"\353\006\n\023VulnerabilityReport\022\021\n\004name\030\001 "
+ "proto\"\303\010\n\023VulnerabilityReport\022\021\n\004name\030\001 "
+ "\001(\tB\003\340A\003\022Y\n\017vulnerabilities\030\002 \003(\0132;.goog"
+ "le.cloud.osconfig.v1.VulnerabilityReport"
+ ".VulnerabilityB\003\340A\003\0224\n\013update_time\030\003 \001(\013"
+ "2\032.google.protobuf.TimestampB\003\340A\003\032\252\004\n\rVu"
+ "2\032.google.protobuf.TimestampB\003\340A\003\032\202\006\n\rVu"
+ "lnerability\022T\n\007details\030\001 \001(\0132C.google.cl"
+ "oud.osconfig.v1.VulnerabilityReport.Vuln"
+ "erability.Details\022$\n\034installed_inventory"
+ "_item_ids\030\002 \003(\t\022$\n\034available_inventory_i"
+ "tem_ids\030\003 \003(\t\022/\n\013create_time\030\004 \001(\0132\032.goo"
+ "gle.protobuf.Timestamp\022/\n\013update_time\030\005 "
+ "\001(\0132\032.google.protobuf.Timestamp\032\224\002\n\007Deta"
+ "ils\022\013\n\003cve\030\001 \001(\t\022\025\n\rcvss_v2_score\030\002 \001(\002\022"
+ "1\n\007cvss_v3\030\003 \001(\0132 .google.cloud.osconfig"
+ ".v1.CVSSv3\022\020\n\010severity\030\004 \001(\t\022\023\n\013descript"
+ "ion\030\005 \001(\t\022a\n\nreferences\030\006 \003(\0132M.google.c"
+ "loud.osconfig.v1.VulnerabilityReport.Vul"
+ "nerability.Details.Reference\032(\n\tReferenc"
+ "e\022\013\n\003url\030\001 \001(\t\022\016\n\006source\030\002 \001(\t:\202\001\352A\177\n+os"
+ "config.googleapis.com/VulnerabilityRepor"
+ "t\022Pprojects/{project}/locations/{locatio"
+ "n}/instances/{instance}/vulnerabilityRep"
+ "ort\"b\n\035GetVulnerabilityReportRequest\022A\n\004"
+ "name\030\001 \001(\tB3\340A\002\372A-\n+osconfig.googleapis."
+ "com/VulnerabilityReport\"\221\001\n\037ListVulnerab"
+ "ilityReportsRequest\0227\n\006parent\030\001 \001(\tB\'\340A\002"
+ "\372A!\n\037compute.googleapis.com/Instance\022\021\n\t"
+ "page_size\030\002 \001(\005\022\022\n\npage_token\030\003 \001(\t\022\016\n\006f"
+ "ilter\030\004 \001(\t\"\211\001\n ListVulnerabilityReports"
+ "Response\022L\n\025vulnerability_reports\030\001 \003(\0132"
+ "-.google.cloud.osconfig.v1.Vulnerability"
+ "Report\022\027\n\017next_page_token\030\002 \001(\t\"\265\n\n\006CVSS"
+ "v3\022\022\n\nbase_score\030\001 \001(\002\022\034\n\024exploitability"
+ "_score\030\002 \001(\002\022\024\n\014impact_score\030\003 \001(\002\022D\n\rat"
+ "tack_vector\030\005 \001(\0162-.google.cloud.osconfi"
+ "g.v1.CVSSv3.AttackVector\022L\n\021attack_compl"
+ "exity\030\006 \001(\01621.google.cloud.osconfig.v1.C"
+ "VSSv3.AttackComplexity\022P\n\023privileges_req"
+ "uired\030\007 \001(\01623.google.cloud.osconfig.v1.C"
+ "VSSv3.PrivilegesRequired\022J\n\020user_interac"
+ "tion\030\010 \001(\01620.google.cloud.osconfig.v1.CV"
+ "SSv3.UserInteraction\0225\n\005scope\030\t \001(\0162&.go"
+ "ogle.cloud.osconfig.v1.CVSSv3.Scope\022G\n\026c"
+ "onfidentiality_impact\030\n \001(\0162\'.google.clo"
+ "ud.osconfig.v1.CVSSv3.Impact\022A\n\020integrit"
+ "y_impact\030\013 \001(\0162\'.google.cloud.osconfig.v"
+ "1.CVSSv3.Impact\022D\n\023availability_impact\030\014"
+ " \001(\0162\'.google.cloud.osconfig.v1.CVSSv3.I"
+ "mpact\"\231\001\n\014AttackVector\022\035\n\031ATTACK_VECTOR_"
+ "UNSPECIFIED\020\000\022\031\n\025ATTACK_VECTOR_NETWORK\020\001"
+ "\022\032\n\026ATTACK_VECTOR_ADJACENT\020\002\022\027\n\023ATTACK_V"
+ "ECTOR_LOCAL\020\003\022\032\n\026ATTACK_VECTOR_PHYSICAL\020"
+ "\004\"l\n\020AttackComplexity\022!\n\035ATTACK_COMPLEXI"
+ "TY_UNSPECIFIED\020\000\022\031\n\025ATTACK_COMPLEXITY_LO"
+ "W\020\001\022\032\n\026ATTACK_COMPLEXITY_HIGH\020\002\"\222\001\n\022Priv"
+ "ilegesRequired\022#\n\037PRIVILEGES_REQUIRED_UN"
+ "SPECIFIED\020\000\022\034\n\030PRIVILEGES_REQUIRED_NONE\020"
+ "\001\022\033\n\027PRIVILEGES_REQUIRED_LOW\020\002\022\034\n\030PRIVIL"
+ "EGES_REQUIRED_HIGH\020\003\"m\n\017UserInteraction\022"
+ " \n\034USER_INTERACTION_UNSPECIFIED\020\000\022\031\n\025USE"
+ "R_INTERACTION_NONE\020\001\022\035\n\031USER_INTERACTION"
+ "_REQUIRED\020\002\"F\n\005Scope\022\025\n\021SCOPE_UNSPECIFIE"
+ "D\020\000\022\023\n\017SCOPE_UNCHANGED\020\001\022\021\n\rSCOPE_CHANGE"
+ "D\020\002\"R\n\006Impact\022\026\n\022IMPACT_UNSPECIFIED\020\000\022\017\n"
+ "\013IMPACT_HIGH\020\001\022\016\n\nIMPACT_LOW\020\002\022\017\n\013IMPACT"
+ "_NONE\020\003B\312\001\n\034com.google.cloud.osconfig.v1"
+ "B\022VulnerabilityProtoP\001Z@google.golang.or"
+ "g/genproto/googleapis/cloud/osconfig/v1;"
+ "osconfig\252\002\030Google.Cloud.OsConfig.V1\312\002\030Go"
+ "ogle\\Cloud\\OsConfig\\V1\352\002\033Google::Cloud::"
+ "OsConfig::V1b\006proto3"
+ "erability.Details\022(\n\034installed_inventory"
+ "_item_ids\030\002 \003(\tB\002\030\001\022(\n\034available_invento"
+ "ry_item_ids\030\003 \003(\tB\002\030\001\022/\n\013create_time\030\004 \001"
+ "(\0132\032.google.protobuf.Timestamp\022/\n\013update"
+ "_time\030\005 \001(\0132\032.google.protobuf.Timestamp\022"
+ "O\n\005items\030\006 \003(\0132@.google.cloud.osconfig.v"
+ "1.VulnerabilityReport.Vulnerability.Item"
+ "\032\224\002\n\007Details\022\013\n\003cve\030\001 \001(\t\022\025\n\rcvss_v2_sco"
+ "re\030\002 \001(\002\0221\n\007cvss_v3\030\003 \001(\0132 .google.cloud"
+ ".osconfig.v1.CVSSv3\022\020\n\010severity\030\004 \001(\t\022\023\n"
+ "\013description\030\005 \001(\t\022a\n\nreferences\030\006 \003(\0132M"
+ ".google.cloud.osconfig.v1.VulnerabilityR"
+ "eport.Vulnerability.Details.Reference\032(\n"
+ "\tReference\022\013\n\003url\030\001 \001(\t\022\016\n\006source\030\002 \001(\t\032"
+ "}\n\004Item\022#\n\033installed_inventory_item_id\030\001"
+ " \001(\t\022#\n\033available_inventory_item_id\030\002 \001("
+ "\t\022\025\n\rfixed_cpe_uri\030\003 \001(\t\022\024\n\014upstream_fix"
+ "\030\004 \001(\t:\202\001\352A\177\n+osconfig.googleapis.com/Vu"
+ "lnerabilityReport\022Pprojects/{project}/lo"
+ "cations/{location}/instances/{instance}/"
+ "vulnerabilityReport\"b\n\035GetVulnerabilityR"
+ "eportRequest\022A\n\004name\030\001 \001(\tB3\340A\002\372A-\n+osco"
+ "nfig.googleapis.com/VulnerabilityReport\""
+ "\221\001\n\037ListVulnerabilityReportsRequest\0227\n\006p"
+ "arent\030\001 \001(\tB\'\340A\002\372A!\n\037compute.googleapis."
+ "com/Instance\022\021\n\tpage_size\030\002 \001(\005\022\022\n\npage_"
+ "token\030\003 \001(\t\022\016\n\006filter\030\004 \001(\t\"\211\001\n ListVuln"
+ "erabilityReportsResponse\022L\n\025vulnerabilit"
+ "y_reports\030\001 \003(\0132-.google.cloud.osconfig."
+ "v1.VulnerabilityReport\022\027\n\017next_page_toke"
+ "n\030\002 \001(\t\"\265\n\n\006CVSSv3\022\022\n\nbase_score\030\001 \001(\002\022\034"
+ "\n\024exploitability_score\030\002 \001(\002\022\024\n\014impact_s"
+ "core\030\003 \001(\002\022D\n\rattack_vector\030\005 \001(\0162-.goog"
+ "le.cloud.osconfig.v1.CVSSv3.AttackVector"
+ "\022L\n\021attack_complexity\030\006 \001(\01621.google.clo"
+ "ud.osconfig.v1.CVSSv3.AttackComplexity\022P"
+ "\n\023privileges_required\030\007 \001(\01623.google.clo"
+ "ud.osconfig.v1.CVSSv3.PrivilegesRequired"
+ "\022J\n\020user_interaction\030\010 \001(\01620.google.clou"
+ "d.osconfig.v1.CVSSv3.UserInteraction\0225\n\005"
+ "scope\030\t \001(\0162&.google.cloud.osconfig.v1.C"
+ "VSSv3.Scope\022G\n\026confidentiality_impact\030\n "
+ "\001(\0162\'.google.cloud.osconfig.v1.CVSSv3.Im"
+ "pact\022A\n\020integrity_impact\030\013 \001(\0162\'.google."
+ "cloud.osconfig.v1.CVSSv3.Impact\022D\n\023avail"
+ "ability_impact\030\014 \001(\0162\'.google.cloud.osco"
+ "nfig.v1.CVSSv3.Impact\"\231\001\n\014AttackVector\022\035"
+ "\n\031ATTACK_VECTOR_UNSPECIFIED\020\000\022\031\n\025ATTACK_"
+ "VECTOR_NETWORK\020\001\022\032\n\026ATTACK_VECTOR_ADJACE"
+ "NT\020\002\022\027\n\023ATTACK_VECTOR_LOCAL\020\003\022\032\n\026ATTACK_"
+ "VECTOR_PHYSICAL\020\004\"l\n\020AttackComplexity\022!\n"
+ "\035ATTACK_COMPLEXITY_UNSPECIFIED\020\000\022\031\n\025ATTA"
+ "CK_COMPLEXITY_LOW\020\001\022\032\n\026ATTACK_COMPLEXITY"
+ "_HIGH\020\002\"\222\001\n\022PrivilegesRequired\022#\n\037PRIVIL"
+ "EGES_REQUIRED_UNSPECIFIED\020\000\022\034\n\030PRIVILEGE"
+ "S_REQUIRED_NONE\020\001\022\033\n\027PRIVILEGES_REQUIRED"
+ "_LOW\020\002\022\034\n\030PRIVILEGES_REQUIRED_HIGH\020\003\"m\n\017"
+ "UserInteraction\022 \n\034USER_INTERACTION_UNSP"
+ "ECIFIED\020\000\022\031\n\025USER_INTERACTION_NONE\020\001\022\035\n\031"
+ "USER_INTERACTION_REQUIRED\020\002\"F\n\005Scope\022\025\n\021"
+ "SCOPE_UNSPECIFIED\020\000\022\023\n\017SCOPE_UNCHANGED\020\001"
+ "\022\021\n\rSCOPE_CHANGED\020\002\"R\n\006Impact\022\026\n\022IMPACT_"
+ "UNSPECIFIED\020\000\022\017\n\013IMPACT_HIGH\020\001\022\016\n\nIMPACT"
+ "_LOW\020\002\022\017\n\013IMPACT_NONE\020\003B\312\001\n\034com.google.c"
+ "loud.osconfig.v1B\022VulnerabilityProtoP\001Z@"
+ "google.golang.org/genproto/googleapis/cl"
+ "oud/osconfig/v1;osconfig\252\002\030Google.Cloud."
+ "OsConfig.V1\312\002\030Google\\Cloud\\OsConfig\\V1\352\002"
+ "\033Google::Cloud::OsConfig::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
@@ -173,6 +182,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
"AvailableInventoryItemIds",
"CreateTime",
"UpdateTime",
"Items",
});
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Details_descriptor =
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_descriptor
@@ -194,6 +204,16 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new java.lang.String[] {
"Url", "Source",
});
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Item_descriptor =
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_descriptor
.getNestedTypes()
.get(1);
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Item_fieldAccessorTable =
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_osconfig_v1_VulnerabilityReport_Vulnerability_Item_descriptor,
new java.lang.String[] {
"InstalledInventoryItemId", "AvailableInventoryItemId", "FixedCpeUri", "UpstreamFix",
});
internal_static_google_cloud_osconfig_v1_GetVulnerabilityReportRequest_descriptor =
getDescriptor().getMessageTypes().get(1);
internal_static_google_cloud_osconfig_v1_GetVulnerabilityReportRequest_fieldAccessorTable =

0 comments on commit 1b4b542

Please sign in to comment.