aws-sdk-inspector2 1.10.0 → 1.12.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d8a05c9f3073b7cd2de272a497ea7dc33241e5acc2f1ff97ac6c932ef0872a98
4
- data.tar.gz: 657a6c49c85d3ad04967a1372791f7371b39d21a4773c67e80a65c44a88decef
3
+ metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
4
+ data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
5
5
  SHA512:
6
- metadata.gz: 11e3761219c9f9d140f48e298ecd05c7c5a34c22f8bd657ec554bf9abe8f4e9dda48a8cab421f9422ce5d5dbae0ac2f860cb6cf5105c8159e3e9078afbdb5f9a
7
- data.tar.gz: cb819fb1b69b9e446a9e223f6fd72dc5ddc8c6c04c415bbf4ff6af2ad2cde245dd2112dafd2615c7bae21b64d6f4a5bbdea4bc735f941990754655402adb17b8
6
+ metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
7
+ data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.12.0 (2023-05-05)
5
+ ------------------
6
+
7
+ * Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
8
+
9
+ 1.11.0 (2023-05-03)
10
+ ------------------
11
+
12
+ * Feature - This feature provides deep inspection for linux based instance
13
+
4
14
  1.10.0 (2023-01-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.10.0
1
+ 1.12.0
@@ -369,7 +369,16 @@ module Aws::Inspector2
369
369
  # @!group API Operations
370
370
 
371
371
  # Associates an Amazon Web Services account with an Amazon Inspector
372
- # delegated administrator.
372
+ # delegated administrator. An HTTP 200 response indicates the
373
+ # association was successfully started, but doesn’t indicate whether it
374
+ # was completed. You can check if the association completed by using
375
+ # [ListMembers][1] for multiple accounts or [GetMembers][2] for a single
376
+ # account.
377
+ #
378
+ #
379
+ #
380
+ # [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListMembers.html
381
+ # [2]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_GetMember.html
373
382
  #
374
383
  # @option params [required, String] :account_id
375
384
  # The Amazon Web Services account ID of the member account to be
@@ -489,6 +498,92 @@ module Aws::Inspector2
489
498
  req.send_request(options)
490
499
  end
491
500
 
501
+ # Retrieves Amazon Inspector deep inspection activation status of
502
+ # multiple member accounts within your organization. You must be the
503
+ # delegated administrator of an organization in Amazon Inspector to use
504
+ # this API.
505
+ #
506
+ # @option params [Array<String>] :account_ids
507
+ # The unique identifiers for the Amazon Web Services accounts to
508
+ # retrieve Amazon Inspector deep inspection activation status for.
509
+ # </p>
510
+ #
511
+ # @return [Types::BatchGetMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
512
+ #
513
+ # * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array&lt;Types::MemberAccountEc2DeepInspectionStatusState&gt;
514
+ # * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array&lt;Types::FailedMemberAccountEc2DeepInspectionStatusState&gt;
515
+ #
516
+ # @example Request syntax with placeholder values
517
+ #
518
+ # resp = client.batch_get_member_ec2_deep_inspection_status({
519
+ # account_ids: ["AccountId"],
520
+ # })
521
+ #
522
+ # @example Response structure
523
+ #
524
+ # resp.account_ids #=> Array
525
+ # resp.account_ids[0].account_id #=> String
526
+ # resp.account_ids[0].error_message #=> String
527
+ # resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
528
+ # resp.failed_account_ids #=> Array
529
+ # resp.failed_account_ids[0].account_id #=> String
530
+ # resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
531
+ # resp.failed_account_ids[0].error_message #=> String
532
+ #
533
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetMemberEc2DeepInspectionStatus AWS API Documentation
534
+ #
535
+ # @overload batch_get_member_ec2_deep_inspection_status(params = {})
536
+ # @param [Hash] params ({})
537
+ def batch_get_member_ec2_deep_inspection_status(params = {}, options = {})
538
+ req = build_request(:batch_get_member_ec2_deep_inspection_status, params)
539
+ req.send_request(options)
540
+ end
541
+
542
+ # Activates or deactivates Amazon Inspector deep inspection for the
543
+ # provided member accounts in your organization. You must be the
544
+ # delegated administrator of an organization in Amazon Inspector to use
545
+ # this API.
546
+ #
547
+ # @option params [required, Array<Types::MemberAccountEc2DeepInspectionStatus>] :account_ids
548
+ # The unique identifiers for the Amazon Web Services accounts to change
549
+ # Amazon Inspector deep inspection status for.
550
+ #
551
+ # @return [Types::BatchUpdateMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
552
+ #
553
+ # * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array&lt;Types::MemberAccountEc2DeepInspectionStatusState&gt;
554
+ # * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array&lt;Types::FailedMemberAccountEc2DeepInspectionStatusState&gt;
555
+ #
556
+ # @example Request syntax with placeholder values
557
+ #
558
+ # resp = client.batch_update_member_ec2_deep_inspection_status({
559
+ # account_ids: [ # required
560
+ # {
561
+ # account_id: "AccountId", # required
562
+ # activate_deep_inspection: false, # required
563
+ # },
564
+ # ],
565
+ # })
566
+ #
567
+ # @example Response structure
568
+ #
569
+ # resp.account_ids #=> Array
570
+ # resp.account_ids[0].account_id #=> String
571
+ # resp.account_ids[0].error_message #=> String
572
+ # resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
573
+ # resp.failed_account_ids #=> Array
574
+ # resp.failed_account_ids[0].account_id #=> String
575
+ # resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
576
+ # resp.failed_account_ids[0].error_message #=> String
577
+ #
578
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchUpdateMemberEc2DeepInspectionStatus AWS API Documentation
579
+ #
580
+ # @overload batch_update_member_ec2_deep_inspection_status(params = {})
581
+ # @param [Hash] params ({})
582
+ def batch_update_member_ec2_deep_inspection_status(params = {}, options = {})
583
+ req = build_request(:batch_update_member_ec2_deep_inspection_status, params)
584
+ req.send_request(options)
585
+ end
586
+
492
587
  # Cancels the given findings report.
493
588
  #
494
589
  # @option params [required, String] :report_id
@@ -826,7 +921,9 @@ module Aws::Inspector2
826
921
  req.send_request(options)
827
922
  end
828
923
 
829
- # Creates a finding report.
924
+ # Creates a finding report. By default only `ACTIVE` findings are
925
+ # returned in the report. To see `SUPRESSED` or `CLOSED` findings you
926
+ # must specify a value for the `findingStatus` filter criteria.
830
927
  #
831
928
  # @option params [Types::FilterCriteria] :filter_criteria
832
929
  # The filter criteria to apply to the results of the finding report.
@@ -1416,6 +1513,34 @@ module Aws::Inspector2
1416
1513
  req.send_request(options)
1417
1514
  end
1418
1515
 
1516
+ # Retrieves the activation status of Amazon Inspector deep inspection
1517
+ # and custom paths associated with your account.
1518
+ #
1519
+ # @return [Types::GetEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1520
+ #
1521
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
1522
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array&lt;String&gt;
1523
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array&lt;String&gt;
1524
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#status #status} => String
1525
+ #
1526
+ # @example Response structure
1527
+ #
1528
+ # resp.error_message #=> String
1529
+ # resp.org_package_paths #=> Array
1530
+ # resp.org_package_paths[0] #=> String
1531
+ # resp.package_paths #=> Array
1532
+ # resp.package_paths[0] #=> String
1533
+ # resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
1534
+ #
1535
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetEc2DeepInspectionConfiguration AWS API Documentation
1536
+ #
1537
+ # @overload get_ec2_deep_inspection_configuration(params = {})
1538
+ # @param [Hash] params ({})
1539
+ def get_ec2_deep_inspection_configuration(params = {}, options = {})
1540
+ req = build_request(:get_ec2_deep_inspection_configuration, params)
1541
+ req.send_request(options)
1542
+ end
1543
+
1419
1544
  # Gets the status of a findings report.
1420
1545
  #
1421
1546
  # @option params [String] :report_id
@@ -1786,7 +1911,7 @@ module Aws::Inspector2
1786
1911
  # resp.covered_resources[0].resource_metadata.lambda_function.layers[0] #=> String
1787
1912
  # resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
1788
1913
  # resp.covered_resources[0].resource_type #=> String, one of "AWS_EC2_INSTANCE", "AWS_ECR_CONTAINER_IMAGE", "AWS_ECR_REPOSITORY", "AWS_LAMBDA_FUNCTION"
1789
- # resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME"
1914
+ # resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME", "UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_CONFIG_FILE", "DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED", "DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED", "DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED", "DEEP_INSPECTION_NO_INVENTORY"
1790
1915
  # resp.covered_resources[0].scan_status.status_code #=> String, one of "ACTIVE", "INACTIVE"
1791
1916
  # resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE"
1792
1917
  # resp.next_token #=> String
@@ -2836,7 +2961,7 @@ module Aws::Inspector2
2836
2961
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].file_path #=> String
2837
2962
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
2838
2963
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].name #=> String
2839
- # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM"
2964
+ # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM", "GEMSPEC"
2840
2965
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
2841
2966
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].remediation #=> String
2842
2967
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].source_lambda_layer_arn #=> String
@@ -3033,6 +3158,79 @@ module Aws::Inspector2
3033
3158
  req.send_request(options)
3034
3159
  end
3035
3160
 
3161
+ # Lists Amazon Inspector coverage details for a specific vulnerability.
3162
+ #
3163
+ # @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
3164
+ # The criteria used to filter the results of a vulnerability search.
3165
+ #
3166
+ # @option params [String] :next_token
3167
+ # A token to use for paginating results that are returned in the
3168
+ # response. Set the value of this parameter to null for the first
3169
+ # request to a list action. For subsequent calls, use the `NextToken`
3170
+ # value returned from the previous request to continue listing results
3171
+ # after the first page.
3172
+ #
3173
+ # @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3174
+ #
3175
+ # * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
3176
+ # * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array&lt;Types::Vulnerability&gt;
3177
+ #
3178
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
3179
+ #
3180
+ # @example Request syntax with placeholder values
3181
+ #
3182
+ # resp = client.search_vulnerabilities({
3183
+ # filter_criteria: { # required
3184
+ # vulnerability_ids: ["VulnId"], # required
3185
+ # },
3186
+ # next_token: "NextToken",
3187
+ # })
3188
+ #
3189
+ # @example Response structure
3190
+ #
3191
+ # resp.next_token #=> String
3192
+ # resp.vulnerabilities #=> Array
3193
+ # resp.vulnerabilities[0].atig_data.first_seen #=> Time
3194
+ # resp.vulnerabilities[0].atig_data.last_seen #=> Time
3195
+ # resp.vulnerabilities[0].atig_data.targets #=> Array
3196
+ # resp.vulnerabilities[0].atig_data.targets[0] #=> String
3197
+ # resp.vulnerabilities[0].atig_data.ttps #=> Array
3198
+ # resp.vulnerabilities[0].atig_data.ttps[0] #=> String
3199
+ # resp.vulnerabilities[0].cisa_data.action #=> String
3200
+ # resp.vulnerabilities[0].cisa_data.date_added #=> Time
3201
+ # resp.vulnerabilities[0].cisa_data.date_due #=> Time
3202
+ # resp.vulnerabilities[0].cvss2.base_score #=> Float
3203
+ # resp.vulnerabilities[0].cvss2.scoring_vector #=> String
3204
+ # resp.vulnerabilities[0].cvss3.base_score #=> Float
3205
+ # resp.vulnerabilities[0].cvss3.scoring_vector #=> String
3206
+ # resp.vulnerabilities[0].cwes #=> Array
3207
+ # resp.vulnerabilities[0].cwes[0] #=> String
3208
+ # resp.vulnerabilities[0].description #=> String
3209
+ # resp.vulnerabilities[0].detection_platforms #=> Array
3210
+ # resp.vulnerabilities[0].detection_platforms[0] #=> String
3211
+ # resp.vulnerabilities[0].epss.score #=> Float
3212
+ # resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
3213
+ # resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
3214
+ # resp.vulnerabilities[0].id #=> String
3215
+ # resp.vulnerabilities[0].reference_urls #=> Array
3216
+ # resp.vulnerabilities[0].reference_urls[0] #=> String
3217
+ # resp.vulnerabilities[0].related_vulnerabilities #=> Array
3218
+ # resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
3219
+ # resp.vulnerabilities[0].source #=> String, one of "NVD"
3220
+ # resp.vulnerabilities[0].source_url #=> String
3221
+ # resp.vulnerabilities[0].vendor_created_at #=> Time
3222
+ # resp.vulnerabilities[0].vendor_severity #=> String
3223
+ # resp.vulnerabilities[0].vendor_updated_at #=> Time
3224
+ #
3225
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
3226
+ #
3227
+ # @overload search_vulnerabilities(params = {})
3228
+ # @param [Hash] params ({})
3229
+ def search_vulnerabilities(params = {}, options = {})
3230
+ req = build_request(:search_vulnerabilities, params)
3231
+ req.send_request(options)
3232
+ end
3233
+
3036
3234
  # Adds tags to a resource.
3037
3235
  #
3038
3236
  # @option params [required, String] :resource_arn
@@ -3115,6 +3313,56 @@ module Aws::Inspector2
3115
3313
  req.send_request(options)
3116
3314
  end
3117
3315
 
3316
+ # Activates, deactivates Amazon Inspector deep inspection, or updates
3317
+ # custom paths for your account.
3318
+ #
3319
+ # @option params [Boolean] :activate_deep_inspection
3320
+ # Specify `TRUE` to activate Amazon Inspector deep inspection in your
3321
+ # account, or `FALSE` to deactivate. Member accounts in an organization
3322
+ # cannot deactivate deep inspection, instead the delegated administrator
3323
+ # for the organization can deactivate a member account using
3324
+ # [BatchUpdateMemberEc2DeepInspectionStatus][1].
3325
+ #
3326
+ #
3327
+ #
3328
+ # [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_BatchUpdateMemberEc2DeepInspectionStatus.html
3329
+ #
3330
+ # @option params [Array<String>] :package_paths
3331
+ # The Amazon Inspector deep inspection custom paths you are adding for
3332
+ # your account.
3333
+ #
3334
+ # @return [Types::UpdateEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3335
+ #
3336
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
3337
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array&lt;String&gt;
3338
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array&lt;String&gt;
3339
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#status #status} => String
3340
+ #
3341
+ # @example Request syntax with placeholder values
3342
+ #
3343
+ # resp = client.update_ec2_deep_inspection_configuration({
3344
+ # activate_deep_inspection: false,
3345
+ # package_paths: ["Path"],
3346
+ # })
3347
+ #
3348
+ # @example Response structure
3349
+ #
3350
+ # resp.error_message #=> String
3351
+ # resp.org_package_paths #=> Array
3352
+ # resp.org_package_paths[0] #=> String
3353
+ # resp.package_paths #=> Array
3354
+ # resp.package_paths[0] #=> String
3355
+ # resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
3356
+ #
3357
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateEc2DeepInspectionConfiguration AWS API Documentation
3358
+ #
3359
+ # @overload update_ec2_deep_inspection_configuration(params = {})
3360
+ # @param [Hash] params ({})
3361
+ def update_ec2_deep_inspection_configuration(params = {}, options = {})
3362
+ req = build_request(:update_ec2_deep_inspection_configuration, params)
3363
+ req.send_request(options)
3364
+ end
3365
+
3118
3366
  # Specifies the action that is to be applied to the findings that match
3119
3367
  # the filter.
3120
3368
  #
@@ -3421,6 +3669,31 @@ module Aws::Inspector2
3421
3669
  req.send_request(options)
3422
3670
  end
3423
3671
 
3672
+ # Updates the Amazon Inspector deep inspection custom paths for your
3673
+ # organization. You must be an Amazon Inspector delegated administrator
3674
+ # to use this API.
3675
+ #
3676
+ # @option params [required, Array<String>] :org_package_paths
3677
+ # The Amazon Inspector deep inspection custom paths you are adding for
3678
+ # your organization.
3679
+ #
3680
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3681
+ #
3682
+ # @example Request syntax with placeholder values
3683
+ #
3684
+ # resp = client.update_org_ec2_deep_inspection_configuration({
3685
+ # org_package_paths: ["Path"], # required
3686
+ # })
3687
+ #
3688
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateOrgEc2DeepInspectionConfiguration AWS API Documentation
3689
+ #
3690
+ # @overload update_org_ec2_deep_inspection_configuration(params = {})
3691
+ # @param [Hash] params ({})
3692
+ def update_org_ec2_deep_inspection_configuration(params = {}, options = {})
3693
+ req = build_request(:update_org_ec2_deep_inspection_configuration, params)
3694
+ req.send_request(options)
3695
+ end
3696
+
3424
3697
  # Updates the configurations for your Amazon Inspector organization.
3425
3698
  #
3426
3699
  # @option params [required, Types::AutoEnable] :auto_enable
@@ -3469,7 +3742,7 @@ module Aws::Inspector2
3469
3742
  params: params,
3470
3743
  config: config)
3471
3744
  context[:gem_name] = 'aws-sdk-inspector2'
3472
- context[:gem_version] = '1.10.0'
3745
+ context[:gem_version] = '1.12.0'
3473
3746
  Seahorse::Client::Request.new(handlers, context)
3474
3747
  end
3475
3748