Update_Pending_Info
The Pending.Info structure contains the extended information about the update
{
"name": "string",
"contents": [
{
"id": "string",
"default_message": "string",
"args": [
"string"
],
"localized": "string"
}
],
"services_will_be_stopped": [
{
"service": "string",
"description": "Std_LocalizableMessage Object"
}
],
"eulas": [
{
"id": "string",
"default_message": "string",
"args": [
"string"
],
"localized": "string"
}
],
"staged": false,
"knowledge_base": "string",
"description": {
"id": "string",
"default_message": "string",
"args": [
"string"
],
"localized": "string"
},
"priority": "string",
"severity": "string",
"update_type": "string",
"release_date": "string",
"reboot_required": false,
"size": 0
}
Name of the update.
List of the 1. issues addressed since previous/current version 2. new features/improvements
List of the services that will be stopped and restarted during the update installation.
List of EULAs. This list has multiple entries and can be dynamic based on what we are actually installing.
Is the update staged
URL for the knowledge base article describing this update.
The LocalizableMessage structure represents localizable string and message template. Services include one or more localizable message templates in the errors they report so that clients can display diagnostic messages in the native language of the user. Services can include localizable strings in the data returned from operations to allow clients to display localized status information in the native language of the user.
The CommonInfo.Priority enumerated type defines the update installation priority recommendations.
HIGH : Install ASAP
MEDIUM : Install at the earliest convenience
LOW : Install at your discretion
The CommonInfo.Severity enumerated type defines the severity of the issues fixed in the update.
CRITICAL : Vulnerabilities that can be exploited by an unauthenticated attacker from the Internet or those that break the guest/host Operating System isolation. The exploitation results in the complete compromise of confidentiality, integrity, and availability of user data and/or processing resources without user interaction. Exploitation could be leveraged to propagate an Internet worm or execute arbitrary code between Virtual Machines and/or the Host Operating System.
IMPORTANT : Vulnerabilities that are not rated critical but whose exploitation results in the complete compromise of confidentiality and/or integrity of user data and/or processing resources through user assistance or by authenticated attackers. This rating also applies to those vulnerabilities which could lead to the complete compromise of availability when exploitation is by a remote unauthenticated attacker from the Internet or through a breach of virtual machine isolation.
MODERATE : Vulnerabilities where the ability to exploit is mitigated to a significant degree by configuration or difficulty of exploitation, but in certain deployment scenarios could still lead to the compromise of confidentiality, integrity, or availability of user data and/or processing resources.
LOW : All other issues that have a security impact. Vulnerabilities where exploitation is believed to be extremely difficult, or where successful exploitation would have minimal impact
The CommonInfo.Category enumerated type defines update type
SECURITY : Fixes vulnerabilities, doesn't change functionality
FIX : Fixes bugs/vulnerabilities, doesn't change functionality
UPDATE : Changes product functionality
UPGRADE : Introduces new features, significantly changes product functionality
Update release date.
Flag indicating whether reboot is required after update.
Download Size of update in Megabytes.