patch_jobs.proto 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296
  1. // Copyright 2020 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package google.cloud.osconfig.agentendpoint.v1beta;
  16. option go_package = "google.golang.org/genproto/googleapis/cloud/osconfig/agentendpoint/v1beta;agentendpoint";
  17. option java_outer_classname = "PatchJobs";
  18. option java_package = "com.google.cloud.osconfig.agentendpoint.v1beta";
  19. option php_namespace = "Google\\Cloud\\OsConfig\\V1beta";
  20. // Patch configuration specifications. Contains details on how to
  21. // apply patches to a VM instance.
  22. message PatchConfig {
  23. // Post-patch reboot settings.
  24. enum RebootConfig {
  25. // The default behavior is DEFAULT.
  26. REBOOT_CONFIG_UNSPECIFIED = 0;
  27. // The agent decides if a reboot is necessary by checking
  28. // signals such as registry keys on Windows or `/var/run/reboot-required` on
  29. // APT based systems. On RPM based systems, a set of core system package
  30. // install times are compared with system boot time.
  31. DEFAULT = 1;
  32. // Always reboot the machine after the update completes.
  33. ALWAYS = 2;
  34. // Never reboot the machine after the update completes.
  35. NEVER = 3;
  36. }
  37. // Post-patch reboot settings.
  38. RebootConfig reboot_config = 1;
  39. // Retry strategy can be defined to have the agent retry patching
  40. // during the window if patching fails. If omitted, the agent will use its
  41. // default retry strategy.
  42. RetryStrategy retry_strategy = 2;
  43. // Apt update settings. Use this override the default apt patch rules.
  44. AptSettings apt = 3;
  45. // Yum update settings. Use this override the default yum patch rules.
  46. YumSettings yum = 4;
  47. // Goo update settings. Use this override the default goo patch rules.
  48. GooSettings goo = 5;
  49. // Zypper update settings. Use this override the default zypper patch rules.
  50. ZypperSettings zypper = 6;
  51. // Windows update settings. Use this override the default windows patch rules.
  52. WindowsUpdateSettings windows_update = 7;
  53. // The ExecStep to run before the patch update.
  54. ExecStep pre_step = 8;
  55. // The ExecStep to run after the patch update.
  56. ExecStep post_step = 9;
  57. // Allows the patch job to run on Managed instance groups (MIGs).
  58. bool mig_instances_allowed = 10;
  59. }
  60. // Apt patching will be performed by executing `apt-get update && apt-get
  61. // upgrade`. Additional options can be set to control how this is executed.
  62. message AptSettings {
  63. // Apt patch type.
  64. enum Type {
  65. // By default, upgrade will be performed.
  66. TYPE_UNSPECIFIED = 0;
  67. // Runs `apt-get dist-upgrade`.
  68. DIST = 1;
  69. // Runs `apt-get upgrade`.
  70. UPGRADE = 2;
  71. }
  72. // By changing the type to DIST, the patching will be performed
  73. // using `apt-get dist-upgrade` instead.
  74. Type type = 1;
  75. // List of packages to exclude from update.
  76. repeated string excludes = 2;
  77. // An exclusive list of packages to be updated. These are the only packages
  78. // that will be updated. If these packages are not installed, they will be
  79. // ignored. This field cannot be specified with any other patch configuration
  80. // fields.
  81. repeated string exclusive_packages = 3;
  82. }
  83. // Yum patching will be performed by executing `yum update`. Additional options
  84. // can be set to control how this is executed.
  85. //
  86. // Note that not all settings are supported on all platforms.
  87. message YumSettings {
  88. // Adds the `--security` flag to `yum update`. Not supported on
  89. // all platforms.
  90. bool security = 1;
  91. // Will cause patch to run `yum update-minimal` instead.
  92. bool minimal = 2;
  93. // List of packages to exclude from update. These packages will be excluded by
  94. // using the yum `--exclude` flag.
  95. repeated string excludes = 3;
  96. // An exclusive list of packages to be updated. These are the only packages
  97. // that will be updated. If these packages are not installed, they will be
  98. // ignored. This field must not be specified with any other patch
  99. // configuration fields.
  100. repeated string exclusive_packages = 4;
  101. }
  102. // Googet patching is performed by running `googet update`.
  103. message GooSettings {
  104. }
  105. // Zypper patching is performed by running `zypper patch`.
  106. // See also https://en.opensuse.org/SDB:Zypper_manual.
  107. message ZypperSettings {
  108. // Adds the `--with-optional` flag to `zypper patch`.
  109. bool with_optional = 1;
  110. // Adds the `--with-update` flag, to `zypper patch`.
  111. bool with_update = 2;
  112. // Install only patches with these categories.
  113. // Common categories include security, recommended, and feature.
  114. repeated string categories = 3;
  115. // Install only patches with these severities.
  116. // Common severities include critical, important, moderate, and low.
  117. repeated string severities = 4;
  118. // List of patches to exclude from update.
  119. repeated string excludes = 5;
  120. // An exclusive list of patches to be updated. These are the only patches
  121. // that will be installed using 'zypper patch patch:<patch_name>' command.
  122. // This field must not be used with any other patch configuration fields.
  123. repeated string exclusive_patches = 6;
  124. }
  125. // Windows patching is performed using the Windows Update Agent.
  126. message WindowsUpdateSettings {
  127. // Microsoft Windows update classifications as defined in
  128. // [1]
  129. // https://support.microsoft.com/en-us/help/824684/description-of-the-standard-terminology-that-is-used-to-describe-micro
  130. enum Classification {
  131. // Invalid. If classifications are included, they must be specified.
  132. CLASSIFICATION_UNSPECIFIED = 0;
  133. // "A widely released fix for a specific problem that addresses a critical,
  134. // non-security-related bug." [1]
  135. CRITICAL = 1;
  136. // "A widely released fix for a product-specific, security-related
  137. // vulnerability. Security vulnerabilities are rated by their severity. The
  138. // severity rating is indicated in the Microsoft security bulletin as
  139. // critical, important, moderate, or low." [1]
  140. SECURITY = 2;
  141. // "A widely released and frequent software update that contains additions
  142. // to a product’s definition database. Definition databases are often used
  143. // to detect objects that have specific attributes, such as malicious code,
  144. // phishing websites, or junk mail." [1]
  145. DEFINITION = 3;
  146. // "Software that controls the input and output of a device." [1]
  147. DRIVER = 4;
  148. // "New product functionality that is first distributed outside the context
  149. // of a product release and that is typically included in the next full
  150. // product release." [1]
  151. FEATURE_PACK = 5;
  152. // "A tested, cumulative set of all hotfixes, security updates, critical
  153. // updates, and updates. Additionally, service packs may contain additional
  154. // fixes for problems that are found internally since the release of the
  155. // product. Service packs my also contain a limited number of
  156. // customer-requested design changes or features." [1]
  157. SERVICE_PACK = 6;
  158. // "A utility or feature that helps complete a task or set of tasks." [1]
  159. TOOL = 7;
  160. // "A tested, cumulative set of hotfixes, security updates, critical
  161. // updates, and updates that are packaged together for easy deployment. A
  162. // rollup generally targets a specific area, such as security, or a
  163. // component of a product, such as Internet Information Services (IIS)." [1]
  164. UPDATE_ROLLUP = 8;
  165. // "A widely released fix for a specific problem. An update addresses a
  166. // noncritical, non-security-related bug." [1]
  167. UPDATE = 9;
  168. }
  169. // Only apply updates of these windows update classifications. If empty, all
  170. // updates will be applied.
  171. repeated Classification classifications = 1;
  172. // List of KBs to exclude from update.
  173. repeated string excludes = 2;
  174. // An exclusive list of kbs to be updated. These are the only patches
  175. // that will be updated. This field must not be used with other
  176. // patch configurations.
  177. repeated string exclusive_patches = 3;
  178. }
  179. // The strategy for retrying failed patches during the patch window.
  180. message RetryStrategy {
  181. // If true, the agent will continue to try and patch until the window has
  182. // ended.
  183. bool enabled = 1;
  184. }
  185. // A step that runs an executable for a PatchJob.
  186. message ExecStep {
  187. // The ExecStepConfig for all Linux VMs targeted by the PatchJob.
  188. ExecStepConfig linux_exec_step_config = 1;
  189. // The ExecStepConfig for all Windows VMs targeted by the PatchJob.
  190. ExecStepConfig windows_exec_step_config = 2;
  191. }
  192. // Common configurations for an ExecStep.
  193. message ExecStepConfig {
  194. // The interpreter used to execute the a file.
  195. enum Interpreter {
  196. // Deprecated, defaults to NONE for compatibility reasons.
  197. INTERPRETER_UNSPECIFIED = 0;
  198. // Invalid for a Windows ExecStepConfig. For a Linux ExecStepConfig, the
  199. // interpreter will be parsed from the shebang line of the script if
  200. // unspecified.
  201. NONE = 3;
  202. // Indicates that the script will be run with /bin/sh on Linux and cmd
  203. // on windows.
  204. SHELL = 1;
  205. // Indicates that the file will be run with PowerShell.
  206. POWERSHELL = 2;
  207. }
  208. // Location of the executable.
  209. oneof executable {
  210. // An absolute path to the executable on the VM.
  211. string local_path = 1;
  212. // A GCS object containing the executable.
  213. GcsObject gcs_object = 2;
  214. }
  215. // Defaults to [0]. A list of possible return values that the
  216. // execution can return to indicate a success.
  217. repeated int32 allowed_success_codes = 3;
  218. // The script interpreter to use to run the script. If no interpreter is
  219. // specified the script will be executed directly, which will likely
  220. // only succeed for scripts with shebang lines.
  221. // [Wikipedia shebang](https://en.wikipedia.org/wiki/Shebang_(Unix)).
  222. Interpreter interpreter = 4;
  223. }
  224. // GCS object representation.
  225. message GcsObject {
  226. // Bucket of the GCS object.
  227. string bucket = 1;
  228. // Name of the GCS object.
  229. string object = 2;
  230. // Generation number of the GCS object. This is used to ensure that the
  231. // ExecStep specified by this PatchJob does not change.
  232. int64 generation_number = 3;
  233. }