aws-sdk-inspector2 1.10.0 → 1.12.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-inspector2/client.rb +278 -5
- data/lib/aws-sdk-inspector2/client_api.rb +267 -0
- data/lib/aws-sdk-inspector2/endpoint_parameters.rb +0 -3
- data/lib/aws-sdk-inspector2/endpoint_provider.rb +27 -24
- data/lib/aws-sdk-inspector2/endpoints.rb +84 -0
- data/lib/aws-sdk-inspector2/plugins/endpoints.rb +12 -0
- data/lib/aws-sdk-inspector2/types.rb +550 -5
- data/lib/aws-sdk-inspector2.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
|
4
|
+
data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
|
7
|
+
data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.12.0 (2023-05-05)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
|
8
|
+
|
9
|
+
1.11.0 (2023-05-03)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - This feature provides deep inspection for linux based instance
|
13
|
+
|
4
14
|
1.10.0 (2023-01-18)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.12.0
|
@@ -369,7 +369,16 @@ module Aws::Inspector2
|
|
369
369
|
# @!group API Operations
|
370
370
|
|
371
371
|
# Associates an Amazon Web Services account with an Amazon Inspector
|
372
|
-
# delegated administrator.
|
372
|
+
# delegated administrator. An HTTP 200 response indicates the
|
373
|
+
# association was successfully started, but doesn’t indicate whether it
|
374
|
+
# was completed. You can check if the association completed by using
|
375
|
+
# [ListMembers][1] for multiple accounts or [GetMembers][2] for a single
|
376
|
+
# account.
|
377
|
+
#
|
378
|
+
#
|
379
|
+
#
|
380
|
+
# [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListMembers.html
|
381
|
+
# [2]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_GetMember.html
|
373
382
|
#
|
374
383
|
# @option params [required, String] :account_id
|
375
384
|
# The Amazon Web Services account ID of the member account to be
|
@@ -489,6 +498,92 @@ module Aws::Inspector2
|
|
489
498
|
req.send_request(options)
|
490
499
|
end
|
491
500
|
|
501
|
+
# Retrieves Amazon Inspector deep inspection activation status of
|
502
|
+
# multiple member accounts within your organization. You must be the
|
503
|
+
# delegated administrator of an organization in Amazon Inspector to use
|
504
|
+
# this API.
|
505
|
+
#
|
506
|
+
# @option params [Array<String>] :account_ids
|
507
|
+
# The unique identifiers for the Amazon Web Services accounts to
|
508
|
+
# retrieve Amazon Inspector deep inspection activation status for.
|
509
|
+
# </p>
|
510
|
+
#
|
511
|
+
# @return [Types::BatchGetMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
512
|
+
#
|
513
|
+
# * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array<Types::MemberAccountEc2DeepInspectionStatusState>
|
514
|
+
# * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array<Types::FailedMemberAccountEc2DeepInspectionStatusState>
|
515
|
+
#
|
516
|
+
# @example Request syntax with placeholder values
|
517
|
+
#
|
518
|
+
# resp = client.batch_get_member_ec2_deep_inspection_status({
|
519
|
+
# account_ids: ["AccountId"],
|
520
|
+
# })
|
521
|
+
#
|
522
|
+
# @example Response structure
|
523
|
+
#
|
524
|
+
# resp.account_ids #=> Array
|
525
|
+
# resp.account_ids[0].account_id #=> String
|
526
|
+
# resp.account_ids[0].error_message #=> String
|
527
|
+
# resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
|
528
|
+
# resp.failed_account_ids #=> Array
|
529
|
+
# resp.failed_account_ids[0].account_id #=> String
|
530
|
+
# resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
531
|
+
# resp.failed_account_ids[0].error_message #=> String
|
532
|
+
#
|
533
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetMemberEc2DeepInspectionStatus AWS API Documentation
|
534
|
+
#
|
535
|
+
# @overload batch_get_member_ec2_deep_inspection_status(params = {})
|
536
|
+
# @param [Hash] params ({})
|
537
|
+
def batch_get_member_ec2_deep_inspection_status(params = {}, options = {})
|
538
|
+
req = build_request(:batch_get_member_ec2_deep_inspection_status, params)
|
539
|
+
req.send_request(options)
|
540
|
+
end
|
541
|
+
|
542
|
+
# Activates or deactivates Amazon Inspector deep inspection for the
|
543
|
+
# provided member accounts in your organization. You must be the
|
544
|
+
# delegated administrator of an organization in Amazon Inspector to use
|
545
|
+
# this API.
|
546
|
+
#
|
547
|
+
# @option params [required, Array<Types::MemberAccountEc2DeepInspectionStatus>] :account_ids
|
548
|
+
# The unique identifiers for the Amazon Web Services accounts to change
|
549
|
+
# Amazon Inspector deep inspection status for.
|
550
|
+
#
|
551
|
+
# @return [Types::BatchUpdateMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
552
|
+
#
|
553
|
+
# * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array<Types::MemberAccountEc2DeepInspectionStatusState>
|
554
|
+
# * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array<Types::FailedMemberAccountEc2DeepInspectionStatusState>
|
555
|
+
#
|
556
|
+
# @example Request syntax with placeholder values
|
557
|
+
#
|
558
|
+
# resp = client.batch_update_member_ec2_deep_inspection_status({
|
559
|
+
# account_ids: [ # required
|
560
|
+
# {
|
561
|
+
# account_id: "AccountId", # required
|
562
|
+
# activate_deep_inspection: false, # required
|
563
|
+
# },
|
564
|
+
# ],
|
565
|
+
# })
|
566
|
+
#
|
567
|
+
# @example Response structure
|
568
|
+
#
|
569
|
+
# resp.account_ids #=> Array
|
570
|
+
# resp.account_ids[0].account_id #=> String
|
571
|
+
# resp.account_ids[0].error_message #=> String
|
572
|
+
# resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
|
573
|
+
# resp.failed_account_ids #=> Array
|
574
|
+
# resp.failed_account_ids[0].account_id #=> String
|
575
|
+
# resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
|
576
|
+
# resp.failed_account_ids[0].error_message #=> String
|
577
|
+
#
|
578
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchUpdateMemberEc2DeepInspectionStatus AWS API Documentation
|
579
|
+
#
|
580
|
+
# @overload batch_update_member_ec2_deep_inspection_status(params = {})
|
581
|
+
# @param [Hash] params ({})
|
582
|
+
def batch_update_member_ec2_deep_inspection_status(params = {}, options = {})
|
583
|
+
req = build_request(:batch_update_member_ec2_deep_inspection_status, params)
|
584
|
+
req.send_request(options)
|
585
|
+
end
|
586
|
+
|
492
587
|
# Cancels the given findings report.
|
493
588
|
#
|
494
589
|
# @option params [required, String] :report_id
|
@@ -826,7 +921,9 @@ module Aws::Inspector2
|
|
826
921
|
req.send_request(options)
|
827
922
|
end
|
828
923
|
|
829
|
-
# Creates a finding report.
|
924
|
+
# Creates a finding report. By default only `ACTIVE` findings are
|
925
|
+
# returned in the report. To see `SUPRESSED` or `CLOSED` findings you
|
926
|
+
# must specify a value for the `findingStatus` filter criteria.
|
830
927
|
#
|
831
928
|
# @option params [Types::FilterCriteria] :filter_criteria
|
832
929
|
# The filter criteria to apply to the results of the finding report.
|
@@ -1416,6 +1513,34 @@ module Aws::Inspector2
|
|
1416
1513
|
req.send_request(options)
|
1417
1514
|
end
|
1418
1515
|
|
1516
|
+
# Retrieves the activation status of Amazon Inspector deep inspection
|
1517
|
+
# and custom paths associated with your account.
|
1518
|
+
#
|
1519
|
+
# @return [Types::GetEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1520
|
+
#
|
1521
|
+
# * {Types::GetEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
|
1522
|
+
# * {Types::GetEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array<String>
|
1523
|
+
# * {Types::GetEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array<String>
|
1524
|
+
# * {Types::GetEc2DeepInspectionConfigurationResponse#status #status} => String
|
1525
|
+
#
|
1526
|
+
# @example Response structure
|
1527
|
+
#
|
1528
|
+
# resp.error_message #=> String
|
1529
|
+
# resp.org_package_paths #=> Array
|
1530
|
+
# resp.org_package_paths[0] #=> String
|
1531
|
+
# resp.package_paths #=> Array
|
1532
|
+
# resp.package_paths[0] #=> String
|
1533
|
+
# resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
|
1534
|
+
#
|
1535
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetEc2DeepInspectionConfiguration AWS API Documentation
|
1536
|
+
#
|
1537
|
+
# @overload get_ec2_deep_inspection_configuration(params = {})
|
1538
|
+
# @param [Hash] params ({})
|
1539
|
+
def get_ec2_deep_inspection_configuration(params = {}, options = {})
|
1540
|
+
req = build_request(:get_ec2_deep_inspection_configuration, params)
|
1541
|
+
req.send_request(options)
|
1542
|
+
end
|
1543
|
+
|
1419
1544
|
# Gets the status of a findings report.
|
1420
1545
|
#
|
1421
1546
|
# @option params [String] :report_id
|
@@ -1786,7 +1911,7 @@ module Aws::Inspector2
|
|
1786
1911
|
# resp.covered_resources[0].resource_metadata.lambda_function.layers[0] #=> String
|
1787
1912
|
# resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
|
1788
1913
|
# resp.covered_resources[0].resource_type #=> String, one of "AWS_EC2_INSTANCE", "AWS_ECR_CONTAINER_IMAGE", "AWS_ECR_REPOSITORY", "AWS_LAMBDA_FUNCTION"
|
1789
|
-
# resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME"
|
1914
|
+
# resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME", "UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_CONFIG_FILE", "DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED", "DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED", "DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED", "DEEP_INSPECTION_NO_INVENTORY"
|
1790
1915
|
# resp.covered_resources[0].scan_status.status_code #=> String, one of "ACTIVE", "INACTIVE"
|
1791
1916
|
# resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE"
|
1792
1917
|
# resp.next_token #=> String
|
@@ -2836,7 +2961,7 @@ module Aws::Inspector2
|
|
2836
2961
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].file_path #=> String
|
2837
2962
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
|
2838
2963
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].name #=> String
|
2839
|
-
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM"
|
2964
|
+
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM", "GEMSPEC"
|
2840
2965
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
|
2841
2966
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].remediation #=> String
|
2842
2967
|
# resp.findings[0].package_vulnerability_details.vulnerable_packages[0].source_lambda_layer_arn #=> String
|
@@ -3033,6 +3158,79 @@ module Aws::Inspector2
|
|
3033
3158
|
req.send_request(options)
|
3034
3159
|
end
|
3035
3160
|
|
3161
|
+
# Lists Amazon Inspector coverage details for a specific vulnerability.
|
3162
|
+
#
|
3163
|
+
# @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
|
3164
|
+
# The criteria used to filter the results of a vulnerability search.
|
3165
|
+
#
|
3166
|
+
# @option params [String] :next_token
|
3167
|
+
# A token to use for paginating results that are returned in the
|
3168
|
+
# response. Set the value of this parameter to null for the first
|
3169
|
+
# request to a list action. For subsequent calls, use the `NextToken`
|
3170
|
+
# value returned from the previous request to continue listing results
|
3171
|
+
# after the first page.
|
3172
|
+
#
|
3173
|
+
# @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3174
|
+
#
|
3175
|
+
# * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
|
3176
|
+
# * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array<Types::Vulnerability>
|
3177
|
+
#
|
3178
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
3179
|
+
#
|
3180
|
+
# @example Request syntax with placeholder values
|
3181
|
+
#
|
3182
|
+
# resp = client.search_vulnerabilities({
|
3183
|
+
# filter_criteria: { # required
|
3184
|
+
# vulnerability_ids: ["VulnId"], # required
|
3185
|
+
# },
|
3186
|
+
# next_token: "NextToken",
|
3187
|
+
# })
|
3188
|
+
#
|
3189
|
+
# @example Response structure
|
3190
|
+
#
|
3191
|
+
# resp.next_token #=> String
|
3192
|
+
# resp.vulnerabilities #=> Array
|
3193
|
+
# resp.vulnerabilities[0].atig_data.first_seen #=> Time
|
3194
|
+
# resp.vulnerabilities[0].atig_data.last_seen #=> Time
|
3195
|
+
# resp.vulnerabilities[0].atig_data.targets #=> Array
|
3196
|
+
# resp.vulnerabilities[0].atig_data.targets[0] #=> String
|
3197
|
+
# resp.vulnerabilities[0].atig_data.ttps #=> Array
|
3198
|
+
# resp.vulnerabilities[0].atig_data.ttps[0] #=> String
|
3199
|
+
# resp.vulnerabilities[0].cisa_data.action #=> String
|
3200
|
+
# resp.vulnerabilities[0].cisa_data.date_added #=> Time
|
3201
|
+
# resp.vulnerabilities[0].cisa_data.date_due #=> Time
|
3202
|
+
# resp.vulnerabilities[0].cvss2.base_score #=> Float
|
3203
|
+
# resp.vulnerabilities[0].cvss2.scoring_vector #=> String
|
3204
|
+
# resp.vulnerabilities[0].cvss3.base_score #=> Float
|
3205
|
+
# resp.vulnerabilities[0].cvss3.scoring_vector #=> String
|
3206
|
+
# resp.vulnerabilities[0].cwes #=> Array
|
3207
|
+
# resp.vulnerabilities[0].cwes[0] #=> String
|
3208
|
+
# resp.vulnerabilities[0].description #=> String
|
3209
|
+
# resp.vulnerabilities[0].detection_platforms #=> Array
|
3210
|
+
# resp.vulnerabilities[0].detection_platforms[0] #=> String
|
3211
|
+
# resp.vulnerabilities[0].epss.score #=> Float
|
3212
|
+
# resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
|
3213
|
+
# resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
|
3214
|
+
# resp.vulnerabilities[0].id #=> String
|
3215
|
+
# resp.vulnerabilities[0].reference_urls #=> Array
|
3216
|
+
# resp.vulnerabilities[0].reference_urls[0] #=> String
|
3217
|
+
# resp.vulnerabilities[0].related_vulnerabilities #=> Array
|
3218
|
+
# resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
|
3219
|
+
# resp.vulnerabilities[0].source #=> String, one of "NVD"
|
3220
|
+
# resp.vulnerabilities[0].source_url #=> String
|
3221
|
+
# resp.vulnerabilities[0].vendor_created_at #=> Time
|
3222
|
+
# resp.vulnerabilities[0].vendor_severity #=> String
|
3223
|
+
# resp.vulnerabilities[0].vendor_updated_at #=> Time
|
3224
|
+
#
|
3225
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
|
3226
|
+
#
|
3227
|
+
# @overload search_vulnerabilities(params = {})
|
3228
|
+
# @param [Hash] params ({})
|
3229
|
+
def search_vulnerabilities(params = {}, options = {})
|
3230
|
+
req = build_request(:search_vulnerabilities, params)
|
3231
|
+
req.send_request(options)
|
3232
|
+
end
|
3233
|
+
|
3036
3234
|
# Adds tags to a resource.
|
3037
3235
|
#
|
3038
3236
|
# @option params [required, String] :resource_arn
|
@@ -3115,6 +3313,56 @@ module Aws::Inspector2
|
|
3115
3313
|
req.send_request(options)
|
3116
3314
|
end
|
3117
3315
|
|
3316
|
+
# Activates, deactivates Amazon Inspector deep inspection, or updates
|
3317
|
+
# custom paths for your account.
|
3318
|
+
#
|
3319
|
+
# @option params [Boolean] :activate_deep_inspection
|
3320
|
+
# Specify `TRUE` to activate Amazon Inspector deep inspection in your
|
3321
|
+
# account, or `FALSE` to deactivate. Member accounts in an organization
|
3322
|
+
# cannot deactivate deep inspection, instead the delegated administrator
|
3323
|
+
# for the organization can deactivate a member account using
|
3324
|
+
# [BatchUpdateMemberEc2DeepInspectionStatus][1].
|
3325
|
+
#
|
3326
|
+
#
|
3327
|
+
#
|
3328
|
+
# [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_BatchUpdateMemberEc2DeepInspectionStatus.html
|
3329
|
+
#
|
3330
|
+
# @option params [Array<String>] :package_paths
|
3331
|
+
# The Amazon Inspector deep inspection custom paths you are adding for
|
3332
|
+
# your account.
|
3333
|
+
#
|
3334
|
+
# @return [Types::UpdateEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3335
|
+
#
|
3336
|
+
# * {Types::UpdateEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
|
3337
|
+
# * {Types::UpdateEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array<String>
|
3338
|
+
# * {Types::UpdateEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array<String>
|
3339
|
+
# * {Types::UpdateEc2DeepInspectionConfigurationResponse#status #status} => String
|
3340
|
+
#
|
3341
|
+
# @example Request syntax with placeholder values
|
3342
|
+
#
|
3343
|
+
# resp = client.update_ec2_deep_inspection_configuration({
|
3344
|
+
# activate_deep_inspection: false,
|
3345
|
+
# package_paths: ["Path"],
|
3346
|
+
# })
|
3347
|
+
#
|
3348
|
+
# @example Response structure
|
3349
|
+
#
|
3350
|
+
# resp.error_message #=> String
|
3351
|
+
# resp.org_package_paths #=> Array
|
3352
|
+
# resp.org_package_paths[0] #=> String
|
3353
|
+
# resp.package_paths #=> Array
|
3354
|
+
# resp.package_paths[0] #=> String
|
3355
|
+
# resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
|
3356
|
+
#
|
3357
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateEc2DeepInspectionConfiguration AWS API Documentation
|
3358
|
+
#
|
3359
|
+
# @overload update_ec2_deep_inspection_configuration(params = {})
|
3360
|
+
# @param [Hash] params ({})
|
3361
|
+
def update_ec2_deep_inspection_configuration(params = {}, options = {})
|
3362
|
+
req = build_request(:update_ec2_deep_inspection_configuration, params)
|
3363
|
+
req.send_request(options)
|
3364
|
+
end
|
3365
|
+
|
3118
3366
|
# Specifies the action that is to be applied to the findings that match
|
3119
3367
|
# the filter.
|
3120
3368
|
#
|
@@ -3421,6 +3669,31 @@ module Aws::Inspector2
|
|
3421
3669
|
req.send_request(options)
|
3422
3670
|
end
|
3423
3671
|
|
3672
|
+
# Updates the Amazon Inspector deep inspection custom paths for your
|
3673
|
+
# organization. You must be an Amazon Inspector delegated administrator
|
3674
|
+
# to use this API.
|
3675
|
+
#
|
3676
|
+
# @option params [required, Array<String>] :org_package_paths
|
3677
|
+
# The Amazon Inspector deep inspection custom paths you are adding for
|
3678
|
+
# your organization.
|
3679
|
+
#
|
3680
|
+
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
3681
|
+
#
|
3682
|
+
# @example Request syntax with placeholder values
|
3683
|
+
#
|
3684
|
+
# resp = client.update_org_ec2_deep_inspection_configuration({
|
3685
|
+
# org_package_paths: ["Path"], # required
|
3686
|
+
# })
|
3687
|
+
#
|
3688
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateOrgEc2DeepInspectionConfiguration AWS API Documentation
|
3689
|
+
#
|
3690
|
+
# @overload update_org_ec2_deep_inspection_configuration(params = {})
|
3691
|
+
# @param [Hash] params ({})
|
3692
|
+
def update_org_ec2_deep_inspection_configuration(params = {}, options = {})
|
3693
|
+
req = build_request(:update_org_ec2_deep_inspection_configuration, params)
|
3694
|
+
req.send_request(options)
|
3695
|
+
end
|
3696
|
+
|
3424
3697
|
# Updates the configurations for your Amazon Inspector organization.
|
3425
3698
|
#
|
3426
3699
|
# @option params [required, Types::AutoEnable] :auto_enable
|
@@ -3469,7 +3742,7 @@ module Aws::Inspector2
|
|
3469
3742
|
params: params,
|
3470
3743
|
config: config)
|
3471
3744
|
context[:gem_name] = 'aws-sdk-inspector2'
|
3472
|
-
context[:gem_version] = '1.
|
3745
|
+
context[:gem_version] = '1.12.0'
|
3473
3746
|
Seahorse::Client::Request.new(handlers, context)
|
3474
3747
|
end
|
3475
3748
|
|