appliance update: summary
The
summary
structure contains the essential information about the updateRepresentation:
{
"description": {
"args": [
"string",
"string"
],
"default_message": "string",
"id": "string"
},
"priority": "HIGH",
"reboot_required": true,
"release_date": "2015-01-01T22:13:05.651Z",
"severity": "CRITICAL",
"size": 1,
"update_type": "SECURITY",
"version": "obj-103"
}
"description": {
"args": [
"string",
"string"
],
"default_message": "string",
"id": "string"
},
"priority": "HIGH",
"reboot_required": true,
"release_date": "2015-01-01T22:13:05.651Z",
"severity": "CRITICAL",
"size": 1,
"update_type": "SECURITY",
"version": "obj-103"
}
Attributes:
Name | Type | Description |
---|---|---|
Required | ||
version | string | Version in form of X.Y.Z.P. e.g. 6.5.1.5400 When clients pass a value of this structure as a parameter, the field must be an identifier for the resource type: com.vmware.appliance.update.pending . When operations return a value of this structure as a result, the field will be an identifier for the resource type: com.vmware.appliance.update.pending . |
description | localizable_message | Description of the update. The short information what this update is. E.g. "Update2 for vCenter Server Appliance 6.5" |
priority | string | Update priority Defines the update installation priority recommendations. Value is one of: HIGH: Install ASAP MEDIUM: Install at the earliest convenience LOW: Install at your discretion |
severity | string | Update severity Defines the severity of the issues fixed in the update. Value is one of: CRITICAL: Vulnerabilities that can be exploited by an unauthenticated attacker from the Internet or those that break the guest/host Operating System isolation. The exploitation results in the complete compromise of confidentiality, integrity, and availability of user data and/or processing resources without user interaction. Exploitation could be leveraged to propagate an Internet worm or execute arbitrary code between Virtual Machines and/or the Host Operating System. IMPORTANT: Vulnerabilities that are not rated critical but whose exploitation results in the complete compromise of confidentiality and/or integrity of user data and/or processing resources through user assistance or by authenticated attackers. This rating also applies to those vulnerabilities which could lead to the complete compromise of availability when exploitation is by a remote unauthenticated attacker from the Internet or through a breach of virtual machine isolation. MODERATE: Vulnerabilities where the ability to exploit is mitigated to a significant degree by configuration or difficulty of exploitation, but in certain deployment scenarios could still lead to the compromise of confidentiality, integrity, or availability of user data and/or processing resources. LOW: All other issues that have a security impact. Vulnerabilities where exploitation is believed to be extremely difficult, or where successful exploitation would have minimal impact |
update_type | string | Update category Defines update type Value is one of: SECURITY: Fixes vulnerabilities, doesn't change functionality FIX: Fixes bugs/vulnerabilities, doesn't change functionality UPDATE: Changes product functionality UPGRADE: Introduces new features, significantly changes product functionality |
release_date | date_time | Update release date. |
reboot_required | boolean | Flag indicating whether reboot is required after update. |
size | long | Download Size of update in Megabytes. |